Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
shipping documents.exe

Overview

General Information

Sample name:shipping documents.exe
Analysis ID:1519241
MD5:7805fa9669d8eee949ec8ae59ab595f0
SHA1:69dcb0498aaf2176629a4d516056e95ede493b8c
SHA256:637e96ec91a77bc1a8bd1b8ff7f0fc027ce9c6ad579980ad7bda632cf500a3d8
Tags:AgentTeslaexeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • shipping documents.exe (PID: 7280 cmdline: "C:\Users\user\Desktop\shipping documents.exe" MD5: 7805FA9669D8EEE949EC8AE59AB595F0)
    • RegSvcs.exe (PID: 7336 cmdline: "C:\Users\user\Desktop\shipping documents.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • boqXv.exe (PID: 7508 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • boqXv.exe (PID: 7776 cmdline: "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 7788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.naveentour.com", "Username": "accounts@naveentour.com", "Password": "nav!T6u2@001"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.2933246931.00000000030E2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.2933246931.0000000003091000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.2933246931.0000000003091000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x33a94:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x33b06:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x33b90:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x33c22:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x33c8c:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x33cfe:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x33d94:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x33e24:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.shipping documents.exe.2fe0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.2.shipping documents.exe.2fe0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 4 entries

                      System Summary

                      barindex
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 7336, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 162.214.80.31, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7336, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T09:01:44.006995+020020301711A Network Trojan was detected192.168.2.449730162.214.80.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T09:00:05.924839+020028555421A Network Trojan was detected192.168.2.449730162.214.80.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T09:00:05.924839+020028552451A Network Trojan was detected192.168.2.449730162.214.80.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T09:01:44.006995+020028397231Malware Command and Control Activity Detected192.168.2.449730162.214.80.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-26T09:01:44.006995+020028400321A Network Trojan was detected192.168.2.449730162.214.80.31587TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.naveentour.com", "Username": "accounts@naveentour.com", "Password": "nav!T6u2@001"}
                      Source: shipping documents.exeReversingLabs: Detection: 26%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: shipping documents.exeJoe Sandbox ML: detected
                      Source: shipping documents.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000002.00000000.1821064536.00000000008D2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.1.dr
                      Source: Binary string: wntdll.pdbUGP source: shipping documents.exe, 00000000.00000003.1720323606.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.1720837963.0000000004680000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: shipping documents.exe, 00000000.00000003.1720323606.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.1720837963.0000000004680000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000002.00000000.1821064536.00000000008D2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.1.dr
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.4:49730 -> 162.214.80.31:587
                      Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49730 -> 162.214.80.31:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.4:49730 -> 162.214.80.31:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.4:49730 -> 162.214.80.31:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.4:49730 -> 162.214.80.31:587
                      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 162.214.80.31:587
                      Source: Joe Sandbox ViewIP Address: 162.214.80.31 162.214.80.31
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 162.214.80.31:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                      Source: global trafficDNS traffic detected: DNS query: mail.naveentour.com
                      Source: RegSvcs.exe, 00000001.00000002.2933246931.00000000030EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.naveentour.com
                      Source: shipping documents.exe, 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, WlTRkNu7R3i.cs.Net Code: MAOHXu5NNLl
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,0_2_0047C81C

                      System Summary

                      barindex
                      Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.shipping documents.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: initial sampleStatic PE information: Filename: shipping documents.exe
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0046A07E PostMessageW,GetFocus,GetDlgCtrlID,PostMessageW,NtdllDialogWndProc_W,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,0_2_0046A07E
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004710F1 NtdllDialogWndProc_W,ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,0_2_004710F1
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045034C GetParent,NtdllDialogWndProc_W,0_2_0045034C
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044036A NtdllDialogWndProc_W,0_2_0044036A
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00440306 NtdllDialogWndProc_W,0_2_00440306
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0047132F NtdllDialogWndProc_W,0_2_0047132F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00440338 NtdllDialogWndProc_W,0_2_00440338
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0046A38E NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_0046A38E
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045039B GetParent,NtdllDialogWndProc_W,NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_0045039B
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004404E8 GetSystemMetrics,MoveWindow,SendMessageW,InvalidateRect,SendMessageW,ShowWindow,NtdllDialogWndProc_W,0_2_004404E8
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044048E NtdllDialogWndProc_W,0_2_0044048E
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044786A NtdllDialogWndProc_W,0_2_0044786A
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0047C81C SendMessageW,NtdllDialogWndProc_W,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,SetCapture,ClientToScreen,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,0_2_0047C81C
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004478AC GetCursorPos,TrackPopupMenuEx,NtdllDialogWndProc_W,GetCursorPos,TrackPopupMenuEx,0_2_004478AC
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004479A0 GetClientRect,GetCursorPos,ScreenToClient,WindowFromPoint,NtdllDialogWndProc_W,0_2_004479A0
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004629B7 NtdllDialogWndProc_W,NtdllDialogWndProc_W,0_2_004629B7
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0047EA6F NtdllDialogWndProc_W,0_2_0047EA6F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00447ABC SendMessageW,NtdllDialogWndProc_W,0_2_00447ABC
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00447B4E NtdllDialogWndProc_W,0_2_00447B4E
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00454CFC NtdllDialogWndProc_W,0_2_00454CFC
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00454D4A NtdllDialogWndProc_W,0_2_00454D4A
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0042FDA6 ClientToScreen,NtdllDialogWndProc_W,0_2_0042FDA6
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0042FE05 NtdllDialogWndProc_W,0_2_0042FE05
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00470E96 DragQueryPoint,SendMessageW,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,0_2_00470E96
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,74AF5590,CreateProcessAsUserW,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00446313
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004096A00_2_004096A0
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0042200C0_2_0042200C
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004041700_2_00404170
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0041A2170_2_0041A217
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004122160_2_00412216
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0042435D0_2_0042435D
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004033C00_2_004033C0
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044F4300_2_0044F430
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004125E80_2_004125E8
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044663B0_2_0044663B
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004138010_2_00413801
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0042096F0_2_0042096F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004129D00_2_004129D0
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004119E30_2_004119E3
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0040FA100_2_0040FA10
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044EB590_2_0044EB59
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00423C810_2_00423C81
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00411E780_2_00411E78
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00442E0C0_2_00442E0C
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00420EC00_2_00420EC0
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044CF170_2_0044CF17
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00444FD20_2_00444FD2
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_03ECA7280_2_03ECA728
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EBA3D81_2_02EBA3D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EBD6581_2_02EBD658
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EB4AC81_2_02EB4AC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EB98101_2_02EB9810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EB3EB01_2_02EB3EB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02EB41F81_2_02EB41F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06578CF01_2_06578CF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0657B6901_2_0657B690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06588F181_2_06588F18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06585A581_2_06585A58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065842D01_2_065842D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065832881_2_06583288
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065800401_2_06580040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0658C0881_2_0658C088
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0658E0A01_2_0658E0A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065853781_2_06585378
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_065839D81_2_065839D8
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: String function: 004115D7 appears 36 times
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: String function: 00416C70 appears 39 times
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: String function: 00445AE0 appears 65 times
                      Source: shipping documents.exe, 00000000.00000003.1721607049.00000000047AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs shipping documents.exe
                      Source: shipping documents.exe, 00000000.00000003.1720323606.0000000004603000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs shipping documents.exe
                      Source: shipping documents.exe, 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecd47e3aa-8ece-4aff-98b8-957acbbca3df.exe4 vs shipping documents.exe
                      Source: shipping documents.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.shipping documents.exe.2fe0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: shipping documents.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9920951973062382
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, yxFFd7F.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, yxFFd7F.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, yxFFd7F.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, yxFFd7F.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, P7gP.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, P7gP.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, Xehk6f9P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, Xehk6f9P.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@1/1
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\boqXvJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7520:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7788:120:WilError_03
                      Source: C:\Users\user\Desktop\shipping documents.exeFile created: C:\Users\user\AppData\Local\Temp\nonplacentalJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\shipping documents.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: shipping documents.exeReversingLabs: Detection: 26%
                      Source: C:\Users\user\Desktop\shipping documents.exeFile read: C:\Users\user\Desktop\shipping documents.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\shipping documents.exe "C:\Users\user\Desktop\shipping documents.exe"
                      Source: C:\Users\user\Desktop\shipping documents.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping documents.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe "C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\shipping documents.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping documents.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: wsock32.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: Binary string: RegSvcs.pdb, source: boqXv.exe, 00000002.00000000.1821064536.00000000008D2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.1.dr
                      Source: Binary string: wntdll.pdbUGP source: shipping documents.exe, 00000000.00000003.1720323606.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.1720837963.0000000004680000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: shipping documents.exe, 00000000.00000003.1720323606.00000000044E0000.00000004.00001000.00020000.00000000.sdmp, shipping documents.exe, 00000000.00000003.1720837963.0000000004680000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: RegSvcs.pdb source: boqXv.exe, 00000002.00000000.1821064536.00000000008D2000.00000002.00000001.01000000.00000006.sdmp, boqXv.exe.1.dr
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06574A10 push es; ret 1_2_06574A20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0657FBC0 push es; ret 1_2_0657FBD0
                      Source: initial sampleStatic PE information: section name: UPX0
                      Source: initial sampleStatic PE information: section name: UPX1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run boqXvJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                      Source: C:\Users\user\Desktop\shipping documents.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\shipping documents.exeAPI/Special instruction interceptor: Address: 3ECA34C
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 1110000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2F30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeMemory allocated: 2D30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1062Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3577Jump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85888
                      Source: C:\Users\user\Desktop\shipping documents.exeAPI coverage: 3.7 %
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 7568Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe TID: 7860Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99312Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99203Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98867Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98752Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98609Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98497Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98390Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98279Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98172Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98062Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97953Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97734Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97625Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97515Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97406Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: RegSvcs.exe, 00000001.00000002.2934990727.0000000006300000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll33<}
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_03ECA618 mov eax, dword ptr fs:[00000030h]0_2_03ECA618
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_03ECA5B8 mov eax, dword ptr fs:[00000030h]0_2_03ECA5B8
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_03EC8F48 mov eax, dword ptr fs:[00000030h]0_2_03EC8F48
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\shipping documents.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F12008Jump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                      Source: C:\Users\user\Desktop\shipping documents.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\shipping documents.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                      Source: shipping documents.exeBinary or memory string: Shell_TrayWnd
                      Source: shipping documents.exe, 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Users\user\AppData\Roaming\boqXv\boqXv.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\boqXv\boqXv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping documents.exe.2fe0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.2933246931.00000000030E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2933246931.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2933246931.00000000030EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: shipping documents.exe PID: 7280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: shipping documents.exeBinary or memory string: WIN_XP
                      Source: shipping documents.exe, 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                      Source: shipping documents.exeBinary or memory string: WIN_XPe
                      Source: shipping documents.exeBinary or memory string: WIN_VISTA
                      Source: shipping documents.exeBinary or memory string: WIN_7
                      Source: shipping documents.exeBinary or memory string: WIN_8
                      Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping documents.exe.2fe0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.2933246931.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: shipping documents.exe PID: 7280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping documents.exe.2fe0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.shipping documents.exe.2fe0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.2933246931.00000000030E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2933246931.0000000003091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2933246931.00000000030EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: shipping documents.exe PID: 7280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                      Source: C:\Users\user\Desktop\shipping documents.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure2
                      Valid Accounts
                      121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts2
                      Native API
                      2
                      Valid Accounts
                      1
                      DLL Side-Loading
                      11
                      Deobfuscate/Decode Files or Information
                      121
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt1
                      Registry Run Keys / Startup Folder
                      2
                      Valid Accounts
                      21
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      2
                      File and Directory Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                      Access Token Manipulation
                      11
                      Software Packing
                      NTDS128
                      System Information Discovery
                      Distributed Component Object Model121
                      Input Capture
                      1
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                      Process Injection
                      1
                      DLL Side-Loading
                      LSA Secrets231
                      Security Software Discovery
                      SSH3
                      Clipboard Data
                      11
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                      Registry Run Keys / Startup Folder
                      1
                      Masquerading
                      Cached Domain Credentials141
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                      Valid Accounts
                      DCSync2
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                      Virtualization/Sandbox Evasion
                      Proc Filesystem11
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                      Access Token Manipulation
                      /etc/passwd and /etc/shadow1
                      System Owner/User Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                      Process Injection
                      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                      Hidden Files and Directories
                      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      shipping documents.exe26%ReversingLabsWin32.Trojan.Generic
                      shipping documents.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\boqXv\boqXv.exe0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://account.dyn.com/0%URL Reputationsafe
                      http://mail.naveentour.com0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.naveentour.com
                      162.214.80.31
                      truetrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://account.dyn.com/shipping documents.exe, 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.naveentour.comRegSvcs.exe, 00000001.00000002.2933246931.00000000030EA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        162.214.80.31
                        mail.naveentour.comUnited States
                        46606UNIFIEDLAYER-AS-1UStrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1519241
                        Start date and time:2024-09-26 08:59:05 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 57s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:10
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:shipping documents.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@7/5@1/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 53
                        • Number of non-executed functions: 280
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target boqXv.exe, PID 7508 because it is empty
                        • Execution Graph export aborted for target boqXv.exe, PID 7776 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: shipping documents.exe
                        TimeTypeDescription
                        03:00:03API Interceptor23x Sleep call for process: RegSvcs.exe modified
                        08:00:03AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                        08:00:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run boqXv C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        162.214.80.31Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousFormBookBrowse
                        • www.jankarbaniye.com/b0y1/?6lW=1U5PN8N6yuNxFbnRAin6Tz5RwyKEa7xk32QpIpyTbdO3G4GoDzxHmgdPjrccGNMrxl/A&w8nHM=JBtTrRP
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        mail.naveentour.comShipping Document.exeGet hashmaliciousAgentTeslaBrowse
                        • 162.214.80.31
                        yq5xNPpWCT.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                        • 162.214.80.31
                        AWB#5305323204643.scr.exeGet hashmaliciousAgentTeslaBrowse
                        • 162.214.80.31
                        AWB#5305323204643.scr.exeGet hashmaliciousAgentTeslaBrowse
                        • 162.214.80.31
                        DHL INVOICE.scr.exeGet hashmaliciousAgentTeslaBrowse
                        • 162.214.80.31
                        DHL INVOICE.scr.exeGet hashmaliciousAgentTeslaBrowse
                        • 162.214.80.31
                        Purchase Order.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 162.214.80.31
                        shipping document.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 162.214.80.31
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        UNIFIEDLAYER-AS-1USautorization Letter.exeGet hashmaliciousAgentTeslaBrowse
                        • 192.185.129.60
                        http://www.richfieldkennel.com/SharePointProposalFile/Get hashmaliciousHTMLPhisherBrowse
                        • 192.185.102.120
                        https://putefix.dogfriendlytahoe.com/Get hashmaliciousUnknownBrowse
                        • 192.185.24.110
                        https://albertanewsprint.dogfriendlytahoe.com/Get hashmaliciousUnknownBrowse
                        • 192.185.24.110
                        INDIA - VSL PARTICULARS.pdf.exeGet hashmaliciousAgentTeslaBrowse
                        • 50.87.144.157
                        https://dwr.yoh.mybluehost.me/wp-content/plugins/A/sdh/TU17HLK/Get hashmaliciousUnknownBrowse
                        • 50.6.153.157
                        https://abre.ai/k8hXGet hashmaliciousUnknownBrowse
                        • 50.6.153.157
                        http://nky.beb.mybluehost.me/new/auth/entrar.phpGet hashmaliciousUnknownBrowse
                        • 50.6.153.4
                        https://turkiyecumhuriyetiziraatbankasi.com/Get hashmaliciousUnknownBrowse
                        • 162.240.37.219
                        https://c81df1b32e6c3c5e06e82397233e2695.crimachado.com.br/wehrgiwfbfeifef/djbfhokefbwuwrjow/djhfeokhrwihfekljd/cmVnaXN0cmF0b3JAc3Uuc2U=Get hashmaliciousHTMLPhisherBrowse
                        • 108.179.252.203
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Roaming\boqXv\boqXv.exeautorization Letter.exeGet hashmaliciousAgentTeslaBrowse
                          rMT103SwiftCopyoFPayment.exeGet hashmaliciousAgentTeslaBrowse
                            Shipping Document.exeGet hashmaliciousAgentTeslaBrowse
                              COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                DHL- CBJ520818836689.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  DHL- CBJ520818836689.exeGet hashmaliciousAgentTeslaBrowse
                                    Shipping documents.exeGet hashmaliciousAgentTeslaBrowse
                                      Shipping doc.exeGet hashmaliciousAgentTeslaBrowse
                                        80c619d931fa4e5c89fe87aac0b6b143.exeGet hashmaliciousXWormBrowse
                                          Rejected Shipping Documents compiled PL pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):142
                                            Entropy (8bit):5.090621108356562
                                            Encrypted:false
                                            SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                            MD5:8C0458BB9EA02D50565175E38D577E35
                                            SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                            SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                            SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                            Process:C:\Users\user\Desktop\shipping documents.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):241664
                                            Entropy (8bit):6.7720043307131785
                                            Encrypted:false
                                            SSDEEP:6144:mhMTsqfXsU0IfS0r7Sgqv1L0J5Zr1YAr0KIw:PLfh0Ob7Sz9LI11YAB
                                            MD5:A95877A300BC90D00B2A779ACDCD8929
                                            SHA1:68ED0529B932CD3EABA1801DA23E9CE95ECF0CEB
                                            SHA-256:434C69942A45743C9B398CA8055AD92737D4C54B97130D4BB7BE6703D9C4EE8A
                                            SHA-512:C08B404415DBD09AB42AC5A6C39D599D1E27023D6E3AC23F228FC931DA2506C2C66753880D049171316679AF290B9FD2FD83F7E5552F71DC9D893C4C017FAC22
                                            Malicious:false
                                            Reputation:low
                                            Preview:~..G:W79UPOT..S4.IL4JQ75.913LXG9W79QPOTOAS4TIL4JQ75H913LXG9W.9QPAK.OS.].m.K....QX@l(5V0EX<p,5!/<@t+).8$Y.!W.w..gT8S\.]B^kAS4TIL4..75.823..\W79QPOTO.S6UBM?JQ.6H993LXG9W).RPOtOAS.WIL4.Q7.H911LXC9W79QPOPOAS4TIL4jU75J913LXG;Ww.QP_TOQS4TI\4JA75H913\XG9W79QPOTO..7T.L4JQ.6H.43LXG9W79QPOTOAS4TIL4NQ;5H913LXG9W79QPOTOAS4TIL4JQ75H913LXG9W79QPOTOAS4TIL4Jq75@913LXG9W79QXoTO.S4TIL4JQ75H.EV4,G9W..RPOtOAS.WIL6JQ75H913LXG9W7.QP/z=2!WTILrOQ75.:13JXG9.49QPOTOAS4TIL4.Q7ufKT_#;G9[79QPOPOAQ4TI.7JQ75H913LXG9Ww9Q.OTOAS4TIL4JQ75H91.OXG9W7qQPOVODS..KL.xP76H912LXA9W79QPOTOAS4TIL4JQ75H913LXG9W79QPOTOAS4TIL4JQ75H$.....qi.DoZ-S.g.S.J..Y.L.v>rY.<-..r.].....!O.}J.8...:...".1T)N....l)GED9dBg6P.Q..e...%...I/.N...Jx.Y3l.....a....._;....@../['.VE8UT..9!X%^.S.NTOAS......\0rk.OWY.EOo....{S+b...4Q75,913>XG9679Q.OTO.S4T'L4J/75HG13L.G9Ww9QPxTOAv4TI!4JQ.5H9O3LX.DX8..&'.S4TIL.....%.....p.... .1.-y..-....2f.6Y.;..~..7.$..V._Rj.lMP11M;67OTz7....qMPKDQ3PJ@.D.......~...H...5./4TIL4J.75.913..G.W79.P.T..S4T.4.Q.5..3
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:modified
                                            Size (bytes):45984
                                            Entropy (8bit):6.16795797263964
                                            Encrypted:false
                                            SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                            MD5:9D352BC46709F0CB5EC974633A0C3C94
                                            SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                            SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                            SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: autorization Letter.exe, Detection: malicious, Browse
                                            • Filename: rMT103SwiftCopyoFPayment.exe, Detection: malicious, Browse
                                            • Filename: Shipping Document.exe, Detection: malicious, Browse
                                            • Filename: COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exe, Detection: malicious, Browse
                                            • Filename: DHL- CBJ520818836689.pdf.exe, Detection: malicious, Browse
                                            • Filename: DHL- CBJ520818836689.exe, Detection: malicious, Browse
                                            • Filename: Shipping documents.exe, Detection: malicious, Browse
                                            • Filename: Shipping doc.exe, Detection: malicious, Browse
                                            • Filename: 80c619d931fa4e5c89fe87aac0b6b143.exe, Detection: malicious, Browse
                                            • Filename: Rejected Shipping Documents compiled PL pdf.exe, Detection: malicious, Browse
                                            Reputation:moderate, very likely benign file
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                            Process:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1141
                                            Entropy (8bit):4.442398121585593
                                            Encrypted:false
                                            SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                            MD5:6FB4D27A716A8851BC0505666E7C7A10
                                            SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                            SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                            SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                            Malicious:false
                                            Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                            Entropy (8bit):7.969366771382698
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 94.59%
                                            • AutoIt3 compiled script executable (510682/80) 4.83%
                                            • UPX compressed Win32 Executable (30571/9) 0.29%
                                            • Win32 EXE Yoda's Crypter (26571/9) 0.25%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            File name:shipping documents.exe
                                            File size:814'485 bytes
                                            MD5:7805fa9669d8eee949ec8ae59ab595f0
                                            SHA1:69dcb0498aaf2176629a4d516056e95ede493b8c
                                            SHA256:637e96ec91a77bc1a8bd1b8ff7f0fc027ce9c6ad579980ad7bda632cf500a3d8
                                            SHA512:8ee5fe77a2e415848440acad2d11decca6b8a8e46de89cf7a865b3c9774d072a8bb01fdc81296fe894124c940181c741f9cdb3c33da938a404c07f9630780c81
                                            SSDEEP:24576:tthEVaPqLqx/VZSJRoQKl4+qxwzZdeP8XQs:VEVUcq3ZKRYl4+iUXQs
                                            TLSH:4A05239A36E99C15E9B81675F5430283E8F03839EE7A23DB91566F031DDF200AD2734E
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                            Icon Hash:1733312925935517
                                            Entrypoint:0x4b8e70
                                            Entrypoint Section:UPX1
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                            Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:5
                                            OS Version Minor:0
                                            File Version Major:5
                                            File Version Minor:0
                                            Subsystem Version Major:5
                                            Subsystem Version Minor:0
                                            Import Hash:890e522b31701e079a367b89393329e6
                                            Instruction
                                            pushad
                                            mov esi, 00477000h
                                            lea edi, dword ptr [esi-00076000h]
                                            push edi
                                            jmp 00007FB958D541DDh
                                            nop
                                            mov al, byte ptr [esi]
                                            inc esi
                                            mov byte ptr [edi], al
                                            inc edi
                                            add ebx, ebx
                                            jne 00007FB958D541D9h
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            jc 00007FB958D541BFh
                                            mov eax, 00000001h
                                            add ebx, ebx
                                            jne 00007FB958D541D9h
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            adc eax, eax
                                            add ebx, ebx
                                            jnc 00007FB958D541DDh
                                            jne 00007FB958D541FAh
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            jc 00007FB958D541F1h
                                            dec eax
                                            add ebx, ebx
                                            jne 00007FB958D541D9h
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            adc eax, eax
                                            jmp 00007FB958D541A6h
                                            add ebx, ebx
                                            jne 00007FB958D541D9h
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            adc ecx, ecx
                                            jmp 00007FB958D54224h
                                            xor ecx, ecx
                                            sub eax, 03h
                                            jc 00007FB958D541E3h
                                            shl eax, 08h
                                            mov al, byte ptr [esi]
                                            inc esi
                                            xor eax, FFFFFFFFh
                                            je 00007FB958D54247h
                                            sar eax, 1
                                            mov ebp, eax
                                            jmp 00007FB958D541DDh
                                            add ebx, ebx
                                            jne 00007FB958D541D9h
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            jc 00007FB958D5419Eh
                                            inc ecx
                                            add ebx, ebx
                                            jne 00007FB958D541D9h
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            jc 00007FB958D54190h
                                            add ebx, ebx
                                            jne 00007FB958D541D9h
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            adc ecx, ecx
                                            add ebx, ebx
                                            jnc 00007FB958D541C1h
                                            jne 00007FB958D541DBh
                                            mov ebx, dword ptr [esi]
                                            sub esi, FFFFFFFCh
                                            adc ebx, ebx
                                            jnc 00007FB958D541B6h
                                            add ecx, 02h
                                            cmp ebp, FFFFFB00h
                                            adc ecx, 02h
                                            lea edx, dword ptr [edi+ebp]
                                            cmp ebp, FFFFFFFCh
                                            jbe 00007FB958D541E0h
                                            mov al, byte ptr [edx]
                                            Programming Language:
                                            • [ C ] VS2010 SP1 build 40219
                                            • [C++] VS2010 SP1 build 40219
                                            • [ C ] VS2008 SP1 build 30729
                                            • [IMP] VS2008 SP1 build 30729
                                            • [ASM] VS2010 SP1 build 40219
                                            • [RES] VS2010 SP1 build 40219
                                            • [LNK] VS2010 SP1 build 40219
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc10380x3b0.rsrc
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x7038.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            UPX00x10000x760000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            UPX10x770000x430000x42200d1248dd07f9600cf0199efb427a3e365False0.9920951973062382, Monaural7.928941419297798IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0xba0000x80000x7400081e9bf7107c6346fa754a81d71e3c24False0.5646214978448276data5.907914622258372IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xba5cc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                            RT_ICON0xba6f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                            RT_ICON0xba8240x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                            RT_ICON0xba9500x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                            RT_ICON0xbafbc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                            RT_ICON0xbb2a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                            RT_ICON0xbb3d40xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                            RT_ICON0xbc2800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                            RT_ICON0xbcb2c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                            RT_ICON0xbd0980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                            RT_ICON0xbf6440x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                            RT_ICON0xc06f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                            RT_MENU0xb1b280x50dataEnglishGreat Britain1.1375
                                            RT_DIALOG0xb1b780xfcOpenPGP Public KeyEnglishGreat Britain1.0436507936507937
                                            RT_STRING0xb1c780x530dataEnglishGreat Britain1.0082831325301205
                                            RT_STRING0xb21a80x690dataEnglishGreat Britain1.006547619047619
                                            RT_STRING0xb28380x4d0dataEnglishGreat Britain1.0089285714285714
                                            RT_STRING0xb2d080x5fcdataEnglishGreat Britain1.0071801566579635
                                            RT_STRING0xb33080x65cdataEnglishGreat Britain1.0067567567567568
                                            RT_STRING0xb39680x388dataEnglishGreat Britain1.0121681415929205
                                            RT_STRING0xb3cf00x158dataEnglishUnited States1.0232558139534884
                                            RT_GROUP_ICON0xc0b5c0x84dataEnglishGreat Britain0.6439393939393939
                                            RT_GROUP_ICON0xc0be40x14dataEnglishGreat Britain1.15
                                            RT_GROUP_ICON0xc0bfc0x14dataEnglishGreat Britain1.25
                                            RT_GROUP_ICON0xc0c140x14dataEnglishGreat Britain1.25
                                            RT_VERSION0xc0c2c0x19cdataEnglishGreat Britain0.5339805825242718
                                            RT_MANIFEST0xc0dcc0x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                            DLLImport
                                            KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                            ADVAPI32.dllGetAce
                                            COMCTL32.dllImageList_Remove
                                            COMDLG32.dllGetSaveFileNameW
                                            GDI32.dllLineTo
                                            MPR.dllWNetGetConnectionW
                                            ole32.dllCoInitialize
                                            OLEAUT32.dllVariantInit
                                            PSAPI.DLLEnumProcesses
                                            SHELL32.dllDragFinish
                                            USER32.dllGetDC
                                            USERENV.dllLoadUserProfileW
                                            VERSION.dllVerQueryValueW
                                            WININET.dllFtpOpenFileW
                                            WINMM.dlltimeGetTime
                                            WSOCK32.dllrecv
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishGreat Britain
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-09-26T09:00:05.924839+02002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.449730162.214.80.31587TCP
                                            2024-09-26T09:00:05.924839+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.449730162.214.80.31587TCP
                                            2024-09-26T09:01:44.006995+02002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.449730162.214.80.31587TCP
                                            2024-09-26T09:01:44.006995+02002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.449730162.214.80.31587TCP
                                            2024-09-26T09:01:44.006995+02002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.449730162.214.80.31587TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 26, 2024 09:00:03.815069914 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:03.819984913 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:03.820075989 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:04.535609007 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:04.559710026 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:04.564565897 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:04.718684912 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:04.724154949 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:04.729732037 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:04.888642073 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:04.890862942 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:04.895704985 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.244770050 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.253484011 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:05.258366108 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.412949085 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.413183928 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:05.418139935 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.760036945 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.760390043 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:05.765294075 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.924026966 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.924745083 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:05.924839020 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:05.924839973 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:05.924839973 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:00:05.929954052 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.929969072 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.929981947 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:05.929997921 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:06.218764067 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:00:06.262353897 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:01:43.627791882 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:01:43.633553028 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:01:44.006746054 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:01:44.006918907 CEST58749730162.214.80.31192.168.2.4
                                            Sep 26, 2024 09:01:44.006948948 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:01:44.006994963 CEST49730587192.168.2.4162.214.80.31
                                            Sep 26, 2024 09:01:44.011871099 CEST58749730162.214.80.31192.168.2.4
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 26, 2024 09:00:03.584202051 CEST5904353192.168.2.41.1.1.1
                                            Sep 26, 2024 09:00:03.805978060 CEST53590431.1.1.1192.168.2.4
                                            Sep 26, 2024 09:00:45.534977913 CEST5354466162.159.36.2192.168.2.4
                                            Sep 26, 2024 09:00:46.944384098 CEST53571881.1.1.1192.168.2.4
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Sep 26, 2024 09:00:03.584202051 CEST192.168.2.41.1.1.10x29f1Standard query (0)mail.naveentour.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Sep 26, 2024 09:00:03.805978060 CEST1.1.1.1192.168.2.40x29f1No error (0)mail.naveentour.com162.214.80.31A (IP address)IN (0x0001)false
                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Sep 26, 2024 09:00:04.535609007 CEST58749730162.214.80.31192.168.2.4220-sh011.webhostingservices.com ESMTP Exim 4.96.2 #2 Thu, 26 Sep 2024 12:30:04 +0530
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Sep 26, 2024 09:00:04.559710026 CEST49730587192.168.2.4162.214.80.31EHLO 040965
                                            Sep 26, 2024 09:00:04.718684912 CEST58749730162.214.80.31192.168.2.4250-sh011.webhostingservices.com Hello 040965 [8.46.123.33]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Sep 26, 2024 09:00:04.724154949 CEST49730587192.168.2.4162.214.80.31AUTH login YWNjb3VudHNAbmF2ZWVudG91ci5jb20=
                                            Sep 26, 2024 09:00:04.888642073 CEST58749730162.214.80.31192.168.2.4334 UGFzc3dvcmQ6
                                            Sep 26, 2024 09:00:05.244770050 CEST58749730162.214.80.31192.168.2.4235 Authentication succeeded
                                            Sep 26, 2024 09:00:05.253484011 CEST49730587192.168.2.4162.214.80.31MAIL FROM:<accounts@naveentour.com>
                                            Sep 26, 2024 09:00:05.412949085 CEST58749730162.214.80.31192.168.2.4250 OK
                                            Sep 26, 2024 09:00:05.413183928 CEST49730587192.168.2.4162.214.80.31RCPT TO:<ericsales878@gmail.com>
                                            Sep 26, 2024 09:00:05.760036945 CEST58749730162.214.80.31192.168.2.4250 Accepted
                                            Sep 26, 2024 09:00:05.760390043 CEST49730587192.168.2.4162.214.80.31DATA
                                            Sep 26, 2024 09:00:05.924026966 CEST58749730162.214.80.31192.168.2.4354 Enter message, ending with "." on a line by itself
                                            Sep 26, 2024 09:00:05.924839973 CEST49730587192.168.2.4162.214.80.31.
                                            Sep 26, 2024 09:00:06.218764067 CEST58749730162.214.80.31192.168.2.4250 OK id=1stiTt-000W77-2h
                                            Sep 26, 2024 09:01:43.627791882 CEST49730587192.168.2.4162.214.80.31QUIT
                                            Sep 26, 2024 09:01:44.006746054 CEST58749730162.214.80.31192.168.2.4221 sh011.webhostingservices.com closing connection

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:02:59:59
                                            Start date:26/09/2024
                                            Path:C:\Users\user\Desktop\shipping documents.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\shipping documents.exe"
                                            Imagebase:0x400000
                                            File size:814'485 bytes
                                            MD5 hash:7805FA9669D8EEE949EC8AE59AB595F0
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1723625302.0000000002FE0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:03:00:02
                                            Start date:26/09/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\shipping documents.exe"
                                            Imagebase:0xc30000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2933246931.00000000030E2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2933246931.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2933246931.0000000003091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2932240868.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2933246931.00000000030EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Target ID:2
                                            Start time:03:00:12
                                            Start date:26/09/2024
                                            Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                            Imagebase:0x8d0000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 0%, ReversingLabs
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:03:00:12
                                            Start date:26/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:03:00:20
                                            Start date:26/09/2024
                                            Path:C:\Users\user\AppData\Roaming\boqXv\boqXv.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\boqXv\boqXv.exe"
                                            Imagebase:0xc00000
                                            File size:45'984 bytes
                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:03:00:20
                                            Start date:26/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:3.5%
                                              Dynamic/Decrypted Code Coverage:1.5%
                                              Signature Coverage:8.9%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:37
                                              execution_graph 84404 4010e0 84407 401100 84404->84407 84406 4010f8 84408 401113 84407->84408 84409 40112c 84408->84409 84410 401184 84408->84410 84411 40114c 84408->84411 84412 401120 84408->84412 84409->84406 84442 401250 84410->84442 84413 401151 84411->84413 84414 40119d 84411->84414 84412->84409 84463 401000 Shell_NotifyIconW __localtime64_s 84412->84463 84418 401219 84413->84418 84419 40115d 84413->84419 84416 4011a3 84414->84416 84417 42afb4 84414->84417 84416->84412 84425 4011b6 KillTimer 84416->84425 84426 4011db SetTimer RegisterClipboardFormatW 84416->84426 84458 40f190 10 API calls 84417->84458 84418->84412 84422 401225 84418->84422 84420 401163 84419->84420 84421 42b01d 84419->84421 84427 42afe9 84420->84427 84428 40116c 84420->84428 84421->84409 84462 4370f4 52 API calls 84421->84462 84474 468b0e 74 API calls __localtime64_s 84422->84474 84457 401000 Shell_NotifyIconW __localtime64_s 84425->84457 84426->84409 84433 401204 CreatePopupMenu 84426->84433 84460 40f190 10 API calls 84427->84460 84428->84412 84435 401174 84428->84435 84429 42b04f 84464 40e0c0 84429->84464 84433->84406 84459 45fd57 65 API calls __localtime64_s 84435->84459 84437 42b00e 84461 401a50 328 API calls 84437->84461 84438 4011c9 PostQuitMessage 84438->84406 84441 42afdc 84441->84409 84443 401262 __localtime64_s 84442->84443 84444 4012e8 84442->84444 84475 401b80 84443->84475 84444->84409 84446 40128c 84447 4012d1 KillTimer SetTimer 84446->84447 84448 4012bb 84446->84448 84449 4272ec 84446->84449 84447->84444 84450 4012c5 84448->84450 84451 42733f 84448->84451 84452 4272f4 Shell_NotifyIconW 84449->84452 84453 42731a Shell_NotifyIconW 84449->84453 84450->84447 84454 427393 Shell_NotifyIconW 84450->84454 84455 427348 Shell_NotifyIconW 84451->84455 84456 42736e Shell_NotifyIconW 84451->84456 84452->84447 84453->84447 84454->84447 84455->84447 84456->84447 84457->84438 84458->84409 84459->84441 84460->84437 84461->84409 84462->84409 84463->84429 84466 40e0e7 __localtime64_s 84464->84466 84465 40e142 84468 40e184 84465->84468 84573 4341e6 63 API calls __wcsicoll 84465->84573 84466->84465 84467 42729f DestroyCursor 84466->84467 84467->84465 84470 40e1a0 Shell_NotifyIconW 84468->84470 84471 4272db Shell_NotifyIconW 84468->84471 84472 401b80 54 API calls 84470->84472 84473 40e1ba 84472->84473 84473->84409 84474->84441 84476 401b9c 84475->84476 84496 401c7e 84475->84496 84497 4013c0 84476->84497 84479 42722b LoadStringW 84482 427246 84479->84482 84480 401bb9 84502 402160 84480->84502 84516 40e0a0 84482->84516 84483 401bcd 84485 427258 84483->84485 84486 401bda 84483->84486 84520 40d200 52 API calls 2 library calls 84485->84520 84486->84482 84487 401be4 84486->84487 84515 40d200 52 API calls 2 library calls 84487->84515 84490 427267 84491 42727b 84490->84491 84493 401bf3 __localtime64_s _wcscpy _wcsncpy 84490->84493 84521 40d200 52 API calls 2 library calls 84491->84521 84495 401c62 Shell_NotifyIconW 84493->84495 84494 427289 84495->84496 84496->84446 84522 4115d7 84497->84522 84503 426daa 84502->84503 84504 40216b _wcslen 84502->84504 84560 40c600 84503->84560 84507 402180 84504->84507 84508 40219e 84504->84508 84506 426db5 84506->84483 84559 403bd0 52 API calls moneypunct 84507->84559 84509 4013a0 52 API calls 84508->84509 84512 4021a5 84509->84512 84511 426db7 84512->84511 84513 4115d7 52 API calls 84512->84513 84514 402187 _memmove 84513->84514 84514->84483 84515->84493 84517 40e0b2 84516->84517 84518 40e0a8 84516->84518 84517->84493 84572 403c30 52 API calls _memmove 84518->84572 84520->84490 84521->84494 84524 4115e1 _malloc 84522->84524 84525 4013e4 84524->84525 84528 4115fd std::exception::exception 84524->84528 84536 4135bb 84524->84536 84533 4013a0 84525->84533 84526 41163b 84551 4180af 46 API calls std::exception::operator= 84526->84551 84528->84526 84550 41130a 51 API calls __cinit 84528->84550 84529 411645 84552 418105 RaiseException 84529->84552 84532 411656 84534 4115d7 52 API calls 84533->84534 84535 4013a7 84534->84535 84535->84479 84535->84480 84537 413638 _malloc 84536->84537 84539 4135c9 _malloc 84536->84539 84558 417f77 46 API calls __getptd_noexit 84537->84558 84538 4135d4 84538->84539 84553 418901 46 API calls 2 library calls 84538->84553 84554 418752 46 API calls 8 library calls 84538->84554 84555 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84538->84555 84539->84538 84542 4135f7 RtlAllocateHeap 84539->84542 84545 413624 84539->84545 84548 413622 84539->84548 84542->84539 84543 413630 84542->84543 84543->84524 84556 417f77 46 API calls __getptd_noexit 84545->84556 84557 417f77 46 API calls __getptd_noexit 84548->84557 84550->84526 84551->84529 84552->84532 84553->84538 84554->84538 84556->84548 84557->84543 84558->84543 84559->84514 84561 40c619 84560->84561 84562 40c60a 84560->84562 84561->84506 84562->84561 84565 4026f0 84562->84565 84564 426d7a _memmove 84564->84506 84566 426873 84565->84566 84567 4026ff 84565->84567 84568 4013a0 52 API calls 84566->84568 84567->84564 84569 42687b 84568->84569 84570 4115d7 52 API calls 84569->84570 84571 42689e _memmove 84570->84571 84571->84564 84572->84517 84573->84468 84574 40bd20 84575 428194 84574->84575 84576 40bd2d 84574->84576 84577 40bd43 84575->84577 84579 4281bc 84575->84579 84581 4281b2 84575->84581 84578 40bd37 84576->84578 84597 4531b1 85 API calls 5 library calls 84576->84597 84586 40bd50 84578->84586 84596 45e987 86 API calls moneypunct 84579->84596 84595 40b510 VariantClear 84581->84595 84585 4281ba 84587 426cf1 84586->84587 84588 40bd63 84586->84588 84607 44cde9 52 API calls _memmove 84587->84607 84598 40bd80 84588->84598 84591 40bd73 84591->84577 84592 426cfc 84593 40e0a0 52 API calls 84592->84593 84594 426d02 84593->84594 84595->84585 84596->84576 84597->84578 84599 40bd8e 84598->84599 84606 40bdb7 _memmove 84598->84606 84600 40bded 84599->84600 84601 40bdad 84599->84601 84599->84606 84602 4115d7 52 API calls 84600->84602 84608 402f00 84601->84608 84604 40bdf6 84602->84604 84605 4115d7 52 API calls 84604->84605 84604->84606 84605->84606 84606->84591 84607->84592 84609 402f10 84608->84609 84610 402f0c 84608->84610 84611 4115d7 52 API calls 84609->84611 84612 4268c3 84609->84612 84610->84606 84613 402f51 moneypunct _memmove 84611->84613 84613->84606 84614 425ba2 84619 40e360 84614->84619 84616 425bb4 84635 41130a 51 API calls __cinit 84616->84635 84618 425bbe 84620 4115d7 52 API calls 84619->84620 84621 40e3ec GetModuleFileNameW 84620->84621 84636 413a0e 84621->84636 84623 40e421 _wcsncat 84639 413a9e 84623->84639 84626 4115d7 52 API calls 84627 40e45e _wcscpy 84626->84627 84642 40bc70 84627->84642 84631 40e4a9 84631->84616 84632 401c90 52 API calls 84633 40e4a1 _wcscat _wcslen _wcsncpy 84632->84633 84633->84631 84633->84632 84634 4115d7 52 API calls 84633->84634 84634->84633 84635->84618 84661 413801 84636->84661 84691 419efd 84639->84691 84643 4115d7 52 API calls 84642->84643 84644 40bc98 84643->84644 84645 4115d7 52 API calls 84644->84645 84646 40bca6 84645->84646 84647 40e4c0 84646->84647 84703 403350 84647->84703 84649 40e4cb RegOpenKeyExW 84650 427190 RegQueryValueExW 84649->84650 84651 40e4eb 84649->84651 84652 4271b0 84650->84652 84653 42721a RegCloseKey 84650->84653 84651->84633 84654 4115d7 52 API calls 84652->84654 84653->84633 84655 4271cb 84654->84655 84710 43652f 52 API calls 84655->84710 84657 4271d8 RegQueryValueExW 84658 42720e 84657->84658 84659 4271f7 84657->84659 84658->84653 84660 402160 52 API calls 84659->84660 84660->84658 84662 41389e 84661->84662 84670 41381a 84661->84670 84663 4139e8 84662->84663 84664 413a00 84662->84664 84688 417f77 46 API calls __getptd_noexit 84663->84688 84690 417f77 46 API calls __getptd_noexit 84664->84690 84667 4139ed 84689 417f25 10 API calls ___crtsetenv 84667->84689 84669 413967 84669->84623 84670->84662 84674 41388a 84670->84674 84683 419e30 46 API calls 2 library calls 84670->84683 84672 41396c 84672->84662 84672->84669 84675 41397a 84672->84675 84673 413929 84673->84662 84676 413945 84673->84676 84685 419e30 46 API calls 2 library calls 84673->84685 84674->84662 84682 413909 84674->84682 84684 419e30 46 API calls 2 library calls 84674->84684 84687 419e30 46 API calls 2 library calls 84675->84687 84676->84662 84676->84669 84678 41395b 84676->84678 84686 419e30 46 API calls 2 library calls 84678->84686 84682->84672 84682->84673 84683->84674 84684->84682 84685->84676 84686->84669 84687->84669 84688->84667 84689->84669 84690->84669 84692 419f13 84691->84692 84693 419f0e 84691->84693 84700 417f77 46 API calls __getptd_noexit 84692->84700 84693->84692 84696 419f2b 84693->84696 84695 419f18 84701 417f25 10 API calls ___crtsetenv 84695->84701 84699 40e454 84696->84699 84702 417f77 46 API calls __getptd_noexit 84696->84702 84699->84626 84700->84695 84701->84699 84702->84695 84704 403367 84703->84704 84705 403358 84703->84705 84706 4115d7 52 API calls 84704->84706 84705->84649 84707 403370 84706->84707 84708 4115d7 52 API calls 84707->84708 84709 40339e 84708->84709 84709->84649 84710->84657 84711 3ec9488 84725 3ec70d8 84711->84725 84713 3ec9584 84728 3ec9378 84713->84728 84731 3eca5b8 GetPEB 84725->84731 84727 3ec7763 84727->84713 84729 3ec9381 Sleep 84728->84729 84730 3ec938f 84729->84730 84732 3eca5e2 84731->84732 84732->84727 84733 416454 84770 416c70 84733->84770 84735 416460 GetStartupInfoW 84736 416474 84735->84736 84771 419d5a HeapCreate 84736->84771 84738 4164cd 84739 4164d8 84738->84739 84855 41642b 46 API calls 3 library calls 84738->84855 84772 417c20 GetModuleHandleW 84739->84772 84742 4164de 84744 4164e9 __RTC_Initialize 84742->84744 84856 41642b 46 API calls 3 library calls 84742->84856 84791 41aaa1 GetStartupInfoW 84744->84791 84747 416503 GetCommandLineW 84804 41f584 GetEnvironmentStringsW 84747->84804 84751 416513 84810 41f4d6 GetModuleFileNameW 84751->84810 84753 41651d 84754 416528 84753->84754 84858 411924 46 API calls 3 library calls 84753->84858 84814 41f2a4 84754->84814 84757 41652e 84758 416539 84757->84758 84859 411924 46 API calls 3 library calls 84757->84859 84828 411703 84758->84828 84761 416541 84763 41654c __wwincmdln 84761->84763 84860 411924 46 API calls 3 library calls 84761->84860 84832 40d6b0 84763->84832 84766 41657c 84862 411906 46 API calls _doexit 84766->84862 84769 416581 __write 84770->84735 84771->84738 84773 417c34 84772->84773 84774 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84772->84774 84863 4178ff 49 API calls _free 84773->84863 84776 417c87 TlsAlloc 84774->84776 84779 417cd5 TlsSetValue 84776->84779 84780 417d96 84776->84780 84778 417c39 84778->84742 84779->84780 84781 417ce6 __init_pointers 84779->84781 84780->84742 84864 418151 InitializeCriticalSectionAndSpinCount 84781->84864 84783 417d91 84872 4178ff 49 API calls _free 84783->84872 84785 417d2a 84785->84783 84865 416b49 84785->84865 84788 417d76 84871 41793c 46 API calls 4 library calls 84788->84871 84790 417d7e GetCurrentThreadId 84790->84780 84792 416b49 __calloc_crt 46 API calls 84791->84792 84793 41aabf 84792->84793 84793->84793 84795 416b49 __calloc_crt 46 API calls 84793->84795 84798 41abb4 84793->84798 84799 4164f7 84793->84799 84800 41ac34 84793->84800 84794 41ac6a GetStdHandle 84794->84800 84795->84793 84796 41acce SetHandleCount 84796->84799 84797 41ac7c GetFileType 84797->84800 84798->84800 84801 41abe0 GetFileType 84798->84801 84802 41abeb InitializeCriticalSectionAndSpinCount 84798->84802 84799->84747 84857 411924 46 API calls 3 library calls 84799->84857 84800->84794 84800->84796 84800->84797 84803 41aca2 InitializeCriticalSectionAndSpinCount 84800->84803 84801->84798 84801->84802 84802->84798 84802->84799 84803->84799 84803->84800 84805 41f595 84804->84805 84806 41f599 84804->84806 84805->84751 84882 416b04 84806->84882 84808 41f5c2 FreeEnvironmentStringsW 84808->84751 84809 41f5bb _memmove 84809->84808 84811 41f50b _wparse_cmdline 84810->84811 84812 416b04 __malloc_crt 46 API calls 84811->84812 84813 41f54e _wparse_cmdline 84811->84813 84812->84813 84813->84753 84815 41f2bc _wcslen 84814->84815 84819 41f2b4 84814->84819 84816 416b49 __calloc_crt 46 API calls 84815->84816 84821 41f2e0 _wcslen 84816->84821 84817 41f336 84889 413748 84817->84889 84819->84757 84820 416b49 __calloc_crt 46 API calls 84820->84821 84821->84817 84821->84819 84821->84820 84822 41f35c 84821->84822 84825 41f373 84821->84825 84888 41ef12 46 API calls 2 library calls 84821->84888 84823 413748 _free 46 API calls 84822->84823 84823->84819 84895 417ed3 84825->84895 84827 41f37f 84827->84757 84829 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 84828->84829 84831 411750 __IsNonwritableInCurrentImage 84829->84831 84914 41130a 51 API calls __cinit 84829->84914 84831->84761 84833 42e2f3 84832->84833 84834 40d6cc 84832->84834 84915 408f40 84834->84915 84836 40d707 84919 40ebb0 84836->84919 84839 40d737 84922 411951 84839->84922 84844 40d751 84934 40f4e0 SystemParametersInfoW SystemParametersInfoW 84844->84934 84846 40d75f 84935 40d590 GetCurrentDirectoryW 84846->84935 84848 40d767 SystemParametersInfoW 84849 40d794 84848->84849 84850 40d78d FreeLibrary 84848->84850 84851 408f40 VariantClear 84849->84851 84850->84849 84852 40d79d 84851->84852 84853 408f40 VariantClear 84852->84853 84854 40d7a6 84853->84854 84854->84766 84861 4118da 46 API calls _doexit 84854->84861 84855->84739 84856->84744 84861->84766 84862->84769 84863->84778 84864->84785 84867 416b52 84865->84867 84868 416b8f 84867->84868 84869 416b70 Sleep 84867->84869 84873 41f677 84867->84873 84868->84783 84868->84788 84870 416b85 84869->84870 84870->84867 84870->84868 84871->84790 84872->84780 84874 41f683 84873->84874 84879 41f69e _malloc 84873->84879 84875 41f68f 84874->84875 84874->84879 84881 417f77 46 API calls __getptd_noexit 84875->84881 84876 41f6b1 RtlAllocateHeap 84878 41f6d8 84876->84878 84876->84879 84878->84867 84879->84876 84879->84878 84880 41f694 84880->84867 84881->84880 84884 416b0d 84882->84884 84883 4135bb _malloc 45 API calls 84883->84884 84884->84883 84885 416b43 84884->84885 84886 416b24 Sleep 84884->84886 84885->84809 84887 416b39 84886->84887 84887->84884 84887->84885 84888->84821 84890 413753 RtlFreeHeap 84889->84890 84894 41377c __dosmaperr 84889->84894 84891 413768 84890->84891 84890->84894 84898 417f77 46 API calls __getptd_noexit 84891->84898 84893 41376e GetLastError 84893->84894 84894->84819 84899 417daa 84895->84899 84898->84893 84900 417dc9 __localtime64_s __call_reportfault 84899->84900 84901 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 84900->84901 84902 417eb5 __call_reportfault 84901->84902 84905 41a208 84902->84905 84904 417ed1 GetCurrentProcess TerminateProcess 84904->84827 84906 41a210 84905->84906 84907 41a212 IsDebuggerPresent 84905->84907 84906->84904 84913 41fe19 84907->84913 84910 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 84911 421ff0 __call_reportfault 84910->84911 84912 421ff8 GetCurrentProcess TerminateProcess 84910->84912 84911->84912 84912->84904 84913->84910 84914->84831 84916 408f48 moneypunct 84915->84916 84917 4265c7 VariantClear 84916->84917 84918 408f55 moneypunct 84916->84918 84917->84918 84918->84836 84975 40ebd0 84919->84975 84979 4182cb 84922->84979 84924 41195e 84986 4181f2 RtlLeaveCriticalSection 84924->84986 84926 40d748 84927 4119b0 84926->84927 84928 4119d6 84927->84928 84929 4119bc 84927->84929 84928->84844 84929->84928 85021 417f77 46 API calls __getptd_noexit 84929->85021 84931 4119c6 85022 417f25 10 API calls ___crtsetenv 84931->85022 84933 4119d1 84933->84844 84934->84846 85023 401f20 84935->85023 84937 40d5b6 IsDebuggerPresent 84938 40d5c4 84937->84938 84939 42e1bb MessageBoxA 84937->84939 84940 42e1d4 84938->84940 84941 40d5e3 84938->84941 84939->84940 85192 403a50 52 API calls 3 library calls 84940->85192 85093 40f520 84941->85093 84945 40d5fd GetFullPathNameW 85103 401460 84945->85103 84947 40d63b 84948 40d643 84947->84948 84949 42e231 SetCurrentDirectoryW 84947->84949 84950 40d64c 84948->84950 85193 432fee 6 API calls 84948->85193 84949->84948 85118 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 84950->85118 84954 42e252 84954->84950 84956 42e25a GetModuleFileNameW 84954->84956 84958 42e274 84956->84958 84959 42e2cb GetForegroundWindow ShellExecuteW 84956->84959 84957 40d656 84961 40d669 84957->84961 84964 40e0c0 74 API calls 84957->84964 85194 401b10 84958->85194 84962 40d688 84959->84962 85126 4091e0 84961->85126 84967 40d692 SetCurrentDirectoryW 84962->84967 84964->84961 84967->84848 84968 42e28d 85201 40d200 52 API calls 2 library calls 84968->85201 84972 42e299 GetForegroundWindow ShellExecuteW 84973 42e2c6 84972->84973 84973->84962 84974 40ec00 LoadLibraryA GetProcAddress 84974->84839 84976 40d72e 84975->84976 84977 40ebd6 LoadLibraryA 84975->84977 84976->84839 84976->84974 84977->84976 84978 40ebe7 GetProcAddress 84977->84978 84978->84976 84980 4182e0 84979->84980 84981 4182f3 RtlEnterCriticalSection 84979->84981 84987 418209 84980->84987 84981->84924 84983 4182e6 84983->84981 85014 411924 46 API calls 3 library calls 84983->85014 84986->84926 84988 418215 __write 84987->84988 84989 418225 84988->84989 84990 41823d 84988->84990 85015 418901 46 API calls 2 library calls 84989->85015 84992 416b04 __malloc_crt 45 API calls 84990->84992 84998 41824b __write 84990->84998 84994 418256 84992->84994 84993 41822a 85016 418752 46 API calls 8 library calls 84993->85016 84996 41825d 84994->84996 84997 41826c 84994->84997 85018 417f77 46 API calls __getptd_noexit 84996->85018 85001 4182cb __lock 45 API calls 84997->85001 84998->84983 84999 418231 85017 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84999->85017 85003 418273 85001->85003 85005 4182a6 85003->85005 85006 41827b InitializeCriticalSectionAndSpinCount 85003->85006 85007 413748 _free 45 API calls 85005->85007 85008 418297 85006->85008 85009 41828b 85006->85009 85007->85008 85020 4182c2 RtlLeaveCriticalSection _doexit 85008->85020 85010 413748 _free 45 API calls 85009->85010 85012 418291 85010->85012 85019 417f77 46 API calls __getptd_noexit 85012->85019 85015->84993 85016->84999 85018->84998 85019->85008 85020->84998 85021->84931 85022->84933 85202 40e6e0 85023->85202 85027 401f41 GetModuleFileNameW 85220 410100 85027->85220 85029 401f5c 85232 410960 85029->85232 85032 401b10 52 API calls 85033 401f81 85032->85033 85235 401980 85033->85235 85035 401f8e 85036 408f40 VariantClear 85035->85036 85037 401f9d 85036->85037 85038 401b10 52 API calls 85037->85038 85039 401fb4 85038->85039 85040 401980 53 API calls 85039->85040 85041 401fc3 85040->85041 85042 401b10 52 API calls 85041->85042 85043 401fd2 85042->85043 85243 40c2c0 85043->85243 85045 401fe1 85046 40bc70 52 API calls 85045->85046 85047 401ff3 85046->85047 85261 401a10 85047->85261 85049 401ffe 85268 4114ab 85049->85268 85052 428b05 85054 401a10 52 API calls 85052->85054 85053 402017 85055 4114ab __wcsicoll 58 API calls 85053->85055 85056 428b18 85054->85056 85057 402022 85055->85057 85059 401a10 52 API calls 85056->85059 85057->85056 85058 40202d 85057->85058 85060 4114ab __wcsicoll 58 API calls 85058->85060 85061 428b33 85059->85061 85062 402038 85060->85062 85064 428b3b GetModuleFileNameW 85061->85064 85063 402043 85062->85063 85062->85064 85065 4114ab __wcsicoll 58 API calls 85063->85065 85066 401a10 52 API calls 85064->85066 85067 40204e 85065->85067 85068 428b6c 85066->85068 85069 402092 85067->85069 85073 401a10 52 API calls 85067->85073 85078 428b90 _wcscpy 85067->85078 85070 40e0a0 52 API calls 85068->85070 85072 4020a3 85069->85072 85069->85078 85071 428b7a 85070->85071 85074 401a10 52 API calls 85071->85074 85075 428bc6 85072->85075 85276 40e830 53 API calls 85072->85276 85076 402073 _wcscpy 85073->85076 85077 428b88 85074->85077 85084 401a10 52 API calls 85076->85084 85077->85078 85080 401a10 52 API calls 85078->85080 85088 4020d0 85080->85088 85081 4020bb 85277 40cf00 53 API calls 85081->85277 85083 4020c6 85085 408f40 VariantClear 85083->85085 85084->85069 85085->85088 85086 402110 85090 408f40 VariantClear 85086->85090 85088->85086 85091 401a10 52 API calls 85088->85091 85278 40cf00 53 API calls 85088->85278 85279 40e6a0 53 API calls 85088->85279 85092 402120 moneypunct 85090->85092 85091->85088 85092->84937 85094 40f53c __localtime64_s 85093->85094 85100 40d5f5 85094->85100 85973 410120 85094->85973 85096 40f545 85977 4102b0 SHGetMalloc 85096->85977 85098 40f54c 85982 410190 GetFullPathNameW 85098->85982 85100->84945 85100->84947 85101 40f559 85993 40f570 85101->85993 86055 402400 85103->86055 85105 40146f 85108 428c29 _wcscat 85105->85108 86064 401500 85105->86064 85107 40147c 85107->85108 86072 40d440 85107->86072 85110 401489 85110->85108 85111 401491 GetFullPathNameW 85110->85111 85112 402160 52 API calls 85111->85112 85113 4014bb 85112->85113 85114 402160 52 API calls 85113->85114 85115 4014c8 85114->85115 85115->85108 85116 402160 52 API calls 85115->85116 85117 4014ee 85116->85117 85117->84947 85119 428361 85118->85119 85120 4103fc LoadImageW RegisterClassExW 85118->85120 86095 44395e EnumResourceNamesW LoadImageW 85119->86095 86091 410490 GetSysColorBrush RegisterClassExW RegisterClipboardFormatW 85120->86091 85124 428368 85125 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 85125->84957 85127 409202 85126->85127 85128 42d7ad 85126->85128 85184 409216 moneypunct 85127->85184 86367 410940 328 API calls 85127->86367 86370 45e737 90 API calls 3 library calls 85128->86370 85132 4095b2 85148 40939c 85132->85148 86369 401a50 328 API calls 85132->86369 85133 409253 PeekMessageW 85133->85184 85135 42d8cd Sleep 85135->85184 85136 4095c6 LockWindowUpdate 85140 4095db GetMessageW 85136->85140 85138 42e13b 86388 40d410 VariantClear 85138->86388 85145 4095f9 85140->85145 85140->85148 85142 409386 85142->85148 86368 40f190 10 API calls 85142->86368 85144 409567 PeekMessageW 85144->85184 85147 42e158 TranslateMessage DispatchMessageW GetMessageW 85145->85147 85147->85147 85147->85148 85148->84962 85191 401000 Shell_NotifyIconW __localtime64_s 85148->85191 85149 46f3c1 105 API calls 85149->85184 85150 40e0a0 52 API calls 85150->85184 85151 46fdbf 106 API calls 85190 4094e0 85151->85190 85153 42dcd2 WaitForSingleObject 85156 42dcf0 GetExitCodeProcess CloseHandle 85153->85156 85153->85184 85154 409551 TranslateMessage DispatchMessageW 85154->85144 85155 42dd3d Sleep 85155->85190 86377 40d410 VariantClear 85156->86377 85158 44c29d 52 API calls 85158->85190 85160 4094cf Sleep 85160->85190 85162 40d410 VariantClear 85162->85184 85164 42d94d timeGetTime 86373 465124 53 API calls 85164->86373 85166 40c620 timeGetTime 85166->85190 85169 42dd89 CloseHandle 85169->85190 85170 47d33e 307 API calls 85170->85184 85171 408f40 VariantClear 85171->85190 85173 465124 53 API calls 85173->85190 85174 42de19 GetExitCodeProcess CloseHandle 85174->85190 85178 42de88 Sleep 85178->85184 85180 401980 53 API calls 85180->85190 85183 45e737 90 API calls 85183->85184 85184->85133 85184->85135 85184->85138 85184->85142 85184->85144 85184->85149 85184->85150 85184->85153 85184->85154 85184->85155 85184->85160 85184->85162 85184->85164 85184->85170 85184->85183 85185 42e0cc VariantClear 85184->85185 85186 408f40 VariantClear 85184->85186 85184->85190 86096 4091b0 85184->86096 86154 40afa0 85184->86154 86180 408fc0 85184->86180 86215 408cc0 85184->86215 86229 40d150 85184->86229 86234 40d170 85184->86234 86240 4096a0 85184->86240 86371 465124 53 API calls 85184->86371 86372 40c620 timeGetTime 85184->86372 86387 40e270 VariantClear moneypunct 85184->86387 85185->85184 85186->85184 85187 401b10 52 API calls 85187->85190 85190->85151 85190->85158 85190->85166 85190->85169 85190->85171 85190->85173 85190->85174 85190->85178 85190->85180 85190->85184 85190->85187 86374 45178a 54 API calls 85190->86374 86375 47d33e 328 API calls 85190->86375 86376 453bc6 54 API calls 85190->86376 86378 40d410 VariantClear 85190->86378 86379 443d19 67 API calls _wcslen 85190->86379 86380 4574b4 VariantClear 85190->86380 86381 403cd0 85190->86381 86385 4731e1 VariantClear 85190->86385 86386 4331a2 6 API calls 85190->86386 85191->84962 85192->84947 85193->84954 85195 401b16 _wcslen 85194->85195 85196 4115d7 52 API calls 85195->85196 85199 401b63 85195->85199 85197 401b4b _memmove 85196->85197 85198 4115d7 52 API calls 85197->85198 85198->85199 85200 40d200 52 API calls 2 library calls 85199->85200 85200->84968 85201->84972 85203 40bc70 52 API calls 85202->85203 85204 401f31 85203->85204 85205 402560 85204->85205 85206 40256d __write_nolock 85205->85206 85207 402160 52 API calls 85206->85207 85209 402593 85207->85209 85219 4025bd 85209->85219 85280 401c90 85209->85280 85210 4026f0 52 API calls 85210->85219 85211 4026a7 85212 401b10 52 API calls 85211->85212 85218 4026db 85211->85218 85214 4026d1 85212->85214 85213 401b10 52 API calls 85213->85219 85284 40d7c0 52 API calls 2 library calls 85214->85284 85215 401c90 52 API calls 85215->85219 85218->85027 85219->85210 85219->85211 85219->85213 85219->85215 85283 40d7c0 52 API calls 2 library calls 85219->85283 85285 40f760 85220->85285 85223 410118 85223->85029 85225 42805d 85228 42806a 85225->85228 85341 431e58 85225->85341 85227 413748 _free 46 API calls 85229 428078 85227->85229 85228->85227 85230 431e58 82 API calls 85229->85230 85231 428084 85230->85231 85231->85029 85233 4115d7 52 API calls 85232->85233 85234 401f74 85233->85234 85234->85032 85236 4019a3 85235->85236 85240 401985 85235->85240 85237 4019b8 85236->85237 85236->85240 85962 403e10 53 API calls 85237->85962 85239 40199f 85239->85035 85240->85239 85961 403e10 53 API calls 85240->85961 85242 4019c4 85242->85035 85244 40c2c7 85243->85244 85245 40c30e 85243->85245 85246 40c2d3 85244->85246 85247 426c79 85244->85247 85248 40c315 85245->85248 85249 426c2b 85245->85249 85963 403ea0 52 API calls __cinit 85246->85963 85968 4534e3 52 API calls 85247->85968 85253 40c321 85248->85253 85259 426c5a 85248->85259 85251 426c4b 85249->85251 85252 426c2e 85249->85252 85966 4534e3 52 API calls 85251->85966 85256 40c2de 85252->85256 85965 4534e3 52 API calls 85252->85965 85964 403ea0 52 API calls __cinit 85253->85964 85256->85045 85967 4534e3 52 API calls 85259->85967 85262 401a30 85261->85262 85263 401a17 85261->85263 85265 402160 52 API calls 85262->85265 85264 401a2d 85263->85264 85969 403c30 52 API calls _memmove 85263->85969 85264->85049 85267 401a3d 85265->85267 85267->85049 85269 411523 85268->85269 85270 4114ba 85268->85270 85972 4113a8 58 API calls 4 library calls 85269->85972 85275 40200c 85270->85275 85970 417f77 46 API calls __getptd_noexit 85270->85970 85273 4114c6 85971 417f25 10 API calls ___crtsetenv 85273->85971 85275->85052 85275->85053 85276->85081 85277->85083 85278->85088 85279->85088 85281 4026f0 52 API calls 85280->85281 85282 401c97 85281->85282 85282->85209 85283->85219 85284->85218 85345 40f6f0 85285->85345 85287 40f77b _strcat moneypunct 85353 40f850 85287->85353 85292 427c2a 85383 414d04 85292->85383 85294 40f7fc 85294->85292 85296 40f804 85294->85296 85370 414a46 85296->85370 85300 40f80e 85300->85223 85304 4528bd 85300->85304 85301 427c59 85389 414fe2 85301->85389 85303 427c79 85305 4150d1 _fseek 81 API calls 85304->85305 85306 452930 85305->85306 85886 452719 85306->85886 85309 452948 85309->85225 85310 414d04 __fread_nolock 61 API calls 85311 452966 85310->85311 85312 414d04 __fread_nolock 61 API calls 85311->85312 85313 452976 85312->85313 85314 414d04 __fread_nolock 61 API calls 85313->85314 85315 45298f 85314->85315 85316 414d04 __fread_nolock 61 API calls 85315->85316 85317 4529aa 85316->85317 85318 4150d1 _fseek 81 API calls 85317->85318 85319 4529c4 85318->85319 85320 4135bb _malloc 46 API calls 85319->85320 85321 4529cf 85320->85321 85322 4135bb _malloc 46 API calls 85321->85322 85323 4529db 85322->85323 85324 414d04 __fread_nolock 61 API calls 85323->85324 85325 4529ec 85324->85325 85326 44afef GetSystemTimeAsFileTime 85325->85326 85327 452a00 85326->85327 85328 452a36 85327->85328 85329 452a13 85327->85329 85331 452aa5 85328->85331 85332 452a3c 85328->85332 85330 413748 _free 46 API calls 85329->85330 85333 452a1c 85330->85333 85335 413748 _free 46 API calls 85331->85335 85892 44b1a9 85332->85892 85336 413748 _free 46 API calls 85333->85336 85338 452aa3 85335->85338 85339 452a25 85336->85339 85337 452a9d 85340 413748 _free 46 API calls 85337->85340 85338->85225 85339->85225 85340->85338 85342 431e64 85341->85342 85343 431e6a 85341->85343 85344 414a46 __fcloseall 82 API calls 85342->85344 85343->85228 85344->85343 85346 425de2 85345->85346 85347 40f6fc _wcslen 85345->85347 85346->85287 85348 40f710 WideCharToMultiByte 85347->85348 85349 40f756 85348->85349 85350 40f728 85348->85350 85349->85287 85351 4115d7 52 API calls 85350->85351 85352 40f735 WideCharToMultiByte 85351->85352 85352->85287 85355 40f85d __localtime64_s _strlen 85353->85355 85354 426b3b 85355->85354 85357 40f7ab 85355->85357 85402 414db8 85355->85402 85358 4149c2 85357->85358 85414 414904 85358->85414 85360 40f7e9 85360->85292 85361 40f5c0 85360->85361 85362 40f5cd _strcat __write_nolock _memmove 85361->85362 85363 414d04 __fread_nolock 61 API calls 85362->85363 85365 425d11 85362->85365 85369 40f691 __tzset_nolock 85362->85369 85502 4150d1 85362->85502 85363->85362 85366 4150d1 _fseek 81 API calls 85365->85366 85367 425d33 85366->85367 85368 414d04 __fread_nolock 61 API calls 85367->85368 85368->85369 85369->85294 85371 414a52 __write 85370->85371 85372 414a64 85371->85372 85373 414a79 85371->85373 85642 417f77 46 API calls __getptd_noexit 85372->85642 85376 415471 __lock_file 47 API calls 85373->85376 85381 414a74 __write 85373->85381 85375 414a69 85643 417f25 10 API calls ___crtsetenv 85375->85643 85378 414a92 85376->85378 85626 4149d9 85378->85626 85381->85300 85711 414c76 85383->85711 85385 414d1c 85386 44afef 85385->85386 85879 442c5a 85386->85879 85388 44b00d 85388->85301 85390 414fee __write 85389->85390 85391 414ffa 85390->85391 85392 41500f 85390->85392 85883 417f77 46 API calls __getptd_noexit 85391->85883 85394 415471 __lock_file 47 API calls 85392->85394 85396 415017 85394->85396 85395 414fff 85884 417f25 10 API calls ___crtsetenv 85395->85884 85397 414e4e __ftell_nolock 51 API calls 85396->85397 85399 415024 85397->85399 85885 41503d RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 85399->85885 85401 41500a __write 85401->85303 85403 414dd6 85402->85403 85404 414deb 85402->85404 85411 417f77 46 API calls __getptd_noexit 85403->85411 85404->85403 85407 414df2 85404->85407 85406 414ddb 85412 417f25 10 API calls ___crtsetenv 85406->85412 85409 414de6 85407->85409 85413 418f98 77 API calls 7 library calls 85407->85413 85409->85355 85411->85406 85412->85409 85413->85409 85416 414910 __write 85414->85416 85415 414923 85470 417f77 46 API calls __getptd_noexit 85415->85470 85416->85415 85418 414951 85416->85418 85433 41d4d1 85418->85433 85419 414928 85471 417f25 10 API calls ___crtsetenv 85419->85471 85422 414956 85423 41496a 85422->85423 85424 41495d 85422->85424 85426 414992 85423->85426 85427 414972 85423->85427 85472 417f77 46 API calls __getptd_noexit 85424->85472 85450 41d218 85426->85450 85473 417f77 46 API calls __getptd_noexit 85427->85473 85432 414933 __write @_EH4_CallFilterFunc@8 85432->85360 85434 41d4dd __write 85433->85434 85435 4182cb __lock 46 API calls 85434->85435 85436 41d4eb 85435->85436 85437 41d567 85436->85437 85446 418209 __mtinitlocknum 46 API calls 85436->85446 85448 41d560 85436->85448 85478 4154b2 47 API calls __lock 85436->85478 85479 415520 RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 85436->85479 85439 416b04 __malloc_crt 46 API calls 85437->85439 85441 41d56e 85439->85441 85440 41d5f0 __write 85440->85422 85442 41d57c InitializeCriticalSectionAndSpinCount 85441->85442 85441->85448 85444 41d59c 85442->85444 85445 41d5af RtlEnterCriticalSection 85442->85445 85447 413748 _free 46 API calls 85444->85447 85445->85448 85446->85436 85447->85448 85475 41d5fb 85448->85475 85451 41d23a 85450->85451 85452 41d255 85451->85452 85464 41d26c __wopenfile 85451->85464 85484 417f77 46 API calls __getptd_noexit 85452->85484 85453 41d421 85457 41d47a 85453->85457 85458 41d48c 85453->85458 85455 41d25a 85485 417f25 10 API calls ___crtsetenv 85455->85485 85489 417f77 46 API calls __getptd_noexit 85457->85489 85481 422bf9 85458->85481 85461 41d47f 85490 417f25 10 API calls ___crtsetenv 85461->85490 85462 41499d 85474 4149b8 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 85462->85474 85464->85453 85464->85457 85486 41341f 58 API calls 3 library calls 85464->85486 85466 41d41a 85466->85453 85487 41341f 58 API calls 3 library calls 85466->85487 85468 41d439 85468->85453 85488 41341f 58 API calls 3 library calls 85468->85488 85470->85419 85471->85432 85472->85432 85473->85432 85474->85432 85480 4181f2 RtlLeaveCriticalSection 85475->85480 85477 41d602 85477->85440 85478->85436 85479->85436 85480->85477 85491 422b35 85481->85491 85483 422c14 85483->85462 85484->85455 85485->85462 85486->85466 85487->85468 85488->85453 85489->85461 85490->85462 85493 422b41 __write 85491->85493 85492 422b54 85494 417f77 _malloc 46 API calls 85492->85494 85493->85492 85495 422b8a 85493->85495 85496 422b59 85494->85496 85497 422400 __tsopen_nolock 109 API calls 85495->85497 85498 417f25 ___crtsetenv 10 API calls 85496->85498 85499 422ba4 85497->85499 85501 422b63 __write 85498->85501 85500 422bcb __wsopen_helper RtlLeaveCriticalSection 85499->85500 85500->85501 85501->85483 85505 4150dd __write 85502->85505 85503 4150e9 85533 417f77 46 API calls __getptd_noexit 85503->85533 85505->85503 85506 41510f 85505->85506 85515 415471 85506->85515 85507 4150ee 85534 417f25 10 API calls ___crtsetenv 85507->85534 85514 4150f9 __write 85514->85362 85516 415483 85515->85516 85517 4154a5 RtlEnterCriticalSection 85515->85517 85516->85517 85518 41548b 85516->85518 85519 415117 85517->85519 85520 4182cb __lock 46 API calls 85518->85520 85521 415047 85519->85521 85520->85519 85522 415057 85521->85522 85524 415067 85521->85524 85591 417f77 46 API calls __getptd_noexit 85522->85591 85523 415079 85553 41443c 85523->85553 85524->85523 85536 414e4e 85524->85536 85528 41505c 85535 415143 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 85528->85535 85531 4150b9 85566 41e1f4 85531->85566 85533->85507 85534->85514 85535->85514 85537 414e61 85536->85537 85538 414e79 85536->85538 85592 417f77 46 API calls __getptd_noexit 85537->85592 85540 414139 __fputwc_nolock 46 API calls 85538->85540 85542 414e80 85540->85542 85541 414e66 85593 417f25 10 API calls ___crtsetenv 85541->85593 85544 41e1f4 __write 51 API calls 85542->85544 85545 414e97 85544->85545 85546 414ec9 85545->85546 85547 414f09 85545->85547 85552 414e71 85545->85552 85549 41e1f4 __write 51 API calls 85546->85549 85546->85552 85594 417f77 46 API calls __getptd_noexit 85547->85594 85550 414f64 85549->85550 85551 41e1f4 __write 51 API calls 85550->85551 85550->85552 85551->85552 85552->85523 85554 414455 85553->85554 85558 414477 85553->85558 85555 414139 __fputwc_nolock 46 API calls 85554->85555 85554->85558 85556 414470 85555->85556 85595 41b7b2 77 API calls 5 library calls 85556->85595 85559 414139 85558->85559 85560 414145 85559->85560 85561 41415a 85559->85561 85596 417f77 46 API calls __getptd_noexit 85560->85596 85561->85531 85563 41414a 85597 417f25 10 API calls ___crtsetenv 85563->85597 85565 414155 85565->85531 85567 41e200 __write 85566->85567 85568 41e223 85567->85568 85569 41e208 85567->85569 85571 41e22f 85568->85571 85575 41e269 85568->85575 85618 417f8a 46 API calls __getptd_noexit 85569->85618 85620 417f8a 46 API calls __getptd_noexit 85571->85620 85573 41e20d 85619 417f77 46 API calls __getptd_noexit 85573->85619 85574 41e234 85621 417f77 46 API calls __getptd_noexit 85574->85621 85598 41ae56 85575->85598 85579 41e23c 85622 417f25 10 API calls ___crtsetenv 85579->85622 85580 41e26f 85582 41e291 85580->85582 85583 41e27d 85580->85583 85623 417f77 46 API calls __getptd_noexit 85582->85623 85608 41e17f 85583->85608 85584 41e215 __write 85584->85528 85587 41e296 85624 417f8a 46 API calls __getptd_noexit 85587->85624 85588 41e289 85625 41e2c0 RtlLeaveCriticalSection __unlock_fhandle 85588->85625 85591->85528 85592->85541 85593->85552 85594->85552 85595->85558 85596->85563 85597->85565 85599 41ae62 __write 85598->85599 85600 41aebc 85599->85600 85601 4182cb __lock 46 API calls 85599->85601 85602 41aec1 RtlEnterCriticalSection 85600->85602 85603 41aede __write 85600->85603 85604 41ae8e 85601->85604 85602->85603 85603->85580 85605 41aeaa 85604->85605 85606 41ae97 InitializeCriticalSectionAndSpinCount 85604->85606 85607 41aeec ___lock_fhandle RtlLeaveCriticalSection 85605->85607 85606->85605 85607->85600 85609 41aded __close_nolock 46 API calls 85608->85609 85610 41e18e 85609->85610 85611 41e1a4 SetFilePointer 85610->85611 85612 41e194 85610->85612 85614 41e1c3 85611->85614 85615 41e1bb GetLastError 85611->85615 85613 417f77 _malloc 46 API calls 85612->85613 85616 41e199 85613->85616 85614->85616 85617 417f9d __dosmaperr 46 API calls 85614->85617 85615->85614 85616->85588 85617->85616 85618->85573 85619->85584 85620->85574 85621->85579 85622->85584 85623->85587 85624->85588 85625->85584 85627 4149ea 85626->85627 85628 4149fe 85626->85628 85672 417f77 46 API calls __getptd_noexit 85627->85672 85630 4149fa 85628->85630 85632 41443c __flush 77 API calls 85628->85632 85644 414ab2 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 85630->85644 85631 4149ef 85673 417f25 10 API calls ___crtsetenv 85631->85673 85633 414a0a 85632->85633 85645 41d8c2 85633->85645 85637 414139 __fputwc_nolock 46 API calls 85638 414a18 85637->85638 85649 41d7fe 85638->85649 85640 414a1e 85640->85630 85641 413748 _free 46 API calls 85640->85641 85641->85630 85642->85375 85643->85381 85644->85381 85646 414a12 85645->85646 85647 41d8d2 85645->85647 85646->85637 85647->85646 85648 413748 _free 46 API calls 85647->85648 85648->85646 85650 41d80a __write 85649->85650 85651 41d812 85650->85651 85652 41d82d 85650->85652 85689 417f8a 46 API calls __getptd_noexit 85651->85689 85654 41d839 85652->85654 85657 41d873 85652->85657 85691 417f8a 46 API calls __getptd_noexit 85654->85691 85655 41d817 85690 417f77 46 API calls __getptd_noexit 85655->85690 85660 41ae56 ___lock_fhandle 48 API calls 85657->85660 85659 41d83e 85692 417f77 46 API calls __getptd_noexit 85659->85692 85663 41d879 85660->85663 85661 41d81f __write 85661->85640 85665 41d893 85663->85665 85666 41d887 85663->85666 85664 41d846 85693 417f25 10 API calls ___crtsetenv 85664->85693 85694 417f77 46 API calls __getptd_noexit 85665->85694 85674 41d762 85666->85674 85670 41d88d 85695 41d8ba RtlLeaveCriticalSection __unlock_fhandle 85670->85695 85672->85631 85673->85630 85696 41aded 85674->85696 85676 41d7c8 85709 41ad67 47 API calls 2 library calls 85676->85709 85678 41d772 85678->85676 85680 41aded __close_nolock 46 API calls 85678->85680 85688 41d7a6 85678->85688 85679 41d7d0 85687 41d7f2 85679->85687 85710 417f9d 46 API calls 3 library calls 85679->85710 85682 41d79d 85680->85682 85681 41aded __close_nolock 46 API calls 85683 41d7b2 CloseHandle 85681->85683 85685 41aded __close_nolock 46 API calls 85682->85685 85683->85676 85686 41d7be GetLastError 85683->85686 85685->85688 85686->85676 85687->85670 85688->85676 85688->85681 85689->85655 85690->85661 85691->85659 85692->85664 85693->85661 85694->85670 85695->85661 85697 41ae12 85696->85697 85698 41adfa 85696->85698 85701 417f8a __write 46 API calls 85697->85701 85702 41ae51 85697->85702 85699 417f8a __write 46 API calls 85698->85699 85700 41adff 85699->85700 85703 417f77 _malloc 46 API calls 85700->85703 85704 41ae23 85701->85704 85702->85678 85708 41ae07 85703->85708 85705 417f77 _malloc 46 API calls 85704->85705 85706 41ae2b 85705->85706 85707 417f25 ___crtsetenv 10 API calls 85706->85707 85707->85708 85708->85678 85709->85679 85710->85687 85712 414c82 __write 85711->85712 85713 414cc3 85712->85713 85714 414c96 __localtime64_s 85712->85714 85715 414cbb __write 85712->85715 85716 415471 __lock_file 47 API calls 85713->85716 85738 417f77 46 API calls __getptd_noexit 85714->85738 85715->85385 85717 414ccb 85716->85717 85724 414aba 85717->85724 85720 414cb0 85739 417f25 10 API calls ___crtsetenv 85720->85739 85725 414af2 85724->85725 85729 414ad8 __localtime64_s 85724->85729 85740 414cfa RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 85725->85740 85726 414ae2 85791 417f77 46 API calls __getptd_noexit 85726->85791 85728 414b2d 85728->85725 85732 414c38 __localtime64_s 85728->85732 85733 414139 __fputwc_nolock 46 API calls 85728->85733 85741 41dfcc 85728->85741 85771 41d8f3 85728->85771 85793 41e0c2 46 API calls 4 library calls 85728->85793 85729->85725 85729->85726 85729->85728 85794 417f77 46 API calls __getptd_noexit 85732->85794 85733->85728 85737 414ae7 85792 417f25 10 API calls ___crtsetenv 85737->85792 85738->85720 85739->85715 85740->85715 85742 41dfd8 __write 85741->85742 85743 41dfe0 85742->85743 85744 41dffb 85742->85744 85864 417f8a 46 API calls __getptd_noexit 85743->85864 85745 41e007 85744->85745 85750 41e041 85744->85750 85866 417f8a 46 API calls __getptd_noexit 85745->85866 85748 41dfe5 85865 417f77 46 API calls __getptd_noexit 85748->85865 85749 41e00c 85867 417f77 46 API calls __getptd_noexit 85749->85867 85753 41e063 85750->85753 85754 41e04e 85750->85754 85755 41ae56 ___lock_fhandle 48 API calls 85753->85755 85869 417f8a 46 API calls __getptd_noexit 85754->85869 85758 41e069 85755->85758 85756 41e014 85868 417f25 10 API calls ___crtsetenv 85756->85868 85761 41e077 85758->85761 85762 41e08b 85758->85762 85759 41e053 85870 417f77 46 API calls __getptd_noexit 85759->85870 85760 41dfed __write 85760->85728 85795 41da15 85761->85795 85871 417f77 46 API calls __getptd_noexit 85762->85871 85767 41e083 85873 41e0ba RtlLeaveCriticalSection __unlock_fhandle 85767->85873 85768 41e090 85872 417f8a 46 API calls __getptd_noexit 85768->85872 85772 41d900 85771->85772 85775 41d915 85771->85775 85877 417f77 46 API calls __getptd_noexit 85772->85877 85774 41d905 85878 417f25 10 API calls ___crtsetenv 85774->85878 85778 41d94a 85775->85778 85782 41d910 85775->85782 85874 420603 85775->85874 85779 414139 __fputwc_nolock 46 API calls 85778->85779 85780 41d95e 85779->85780 85781 41dfcc __read 59 API calls 85780->85781 85783 41d965 85781->85783 85782->85728 85783->85782 85784 414139 __fputwc_nolock 46 API calls 85783->85784 85785 41d988 85784->85785 85785->85782 85786 414139 __fputwc_nolock 46 API calls 85785->85786 85787 41d994 85786->85787 85787->85782 85788 414139 __fputwc_nolock 46 API calls 85787->85788 85789 41d9a1 85788->85789 85790 414139 __fputwc_nolock 46 API calls 85789->85790 85790->85782 85791->85737 85792->85725 85793->85728 85794->85737 85796 41da31 85795->85796 85797 41da4c 85795->85797 85798 417f8a __write 46 API calls 85796->85798 85799 41da5b 85797->85799 85801 41da7a 85797->85801 85800 41da36 85798->85800 85802 417f8a __write 46 API calls 85799->85802 85804 417f77 _malloc 46 API calls 85800->85804 85803 41da98 85801->85803 85818 41daac 85801->85818 85805 41da60 85802->85805 85807 417f8a __write 46 API calls 85803->85807 85815 41da3e 85804->85815 85806 417f77 _malloc 46 API calls 85805->85806 85809 41da67 85806->85809 85811 41da9d 85807->85811 85808 41db02 85810 417f8a __write 46 API calls 85808->85810 85812 417f25 ___crtsetenv 10 API calls 85809->85812 85813 41db07 85810->85813 85814 417f77 _malloc 46 API calls 85811->85814 85812->85815 85816 417f77 _malloc 46 API calls 85813->85816 85817 41daa4 85814->85817 85815->85767 85816->85817 85821 417f25 ___crtsetenv 10 API calls 85817->85821 85818->85808 85818->85815 85819 41dae1 85818->85819 85820 41db1b 85818->85820 85819->85808 85827 41daec ReadFile 85819->85827 85823 416b04 __malloc_crt 46 API calls 85820->85823 85821->85815 85824 41db31 85823->85824 85828 41db59 85824->85828 85829 41db3b 85824->85829 85825 41dc17 85826 41df8f GetLastError 85825->85826 85834 41dc2b 85825->85834 85830 41de16 85826->85830 85831 41df9c 85826->85831 85827->85825 85827->85826 85835 420494 __lseeki64_nolock 48 API calls 85828->85835 85833 417f77 _malloc 46 API calls 85829->85833 85838 417f9d __dosmaperr 46 API calls 85830->85838 85843 41dd9b 85830->85843 85832 417f77 _malloc 46 API calls 85831->85832 85836 41dfa1 85832->85836 85837 41db40 85833->85837 85834->85843 85844 41dc47 85834->85844 85847 41de5b 85834->85847 85839 41db67 85835->85839 85840 417f8a __write 46 API calls 85836->85840 85841 417f8a __write 46 API calls 85837->85841 85838->85843 85839->85827 85840->85843 85841->85815 85842 413748 _free 46 API calls 85842->85815 85843->85815 85843->85842 85845 41dcab ReadFile 85844->85845 85854 41dd28 85844->85854 85848 41dcc9 GetLastError 85845->85848 85857 41dcd3 85845->85857 85846 41ded0 ReadFile 85849 41deef GetLastError 85846->85849 85855 41def9 85846->85855 85847->85843 85847->85846 85848->85844 85848->85857 85849->85847 85849->85855 85850 41ddec MultiByteToWideChar 85850->85843 85851 41de10 GetLastError 85850->85851 85851->85830 85852 41dda3 85859 41dd60 85852->85859 85860 41ddda 85852->85860 85853 41dd96 85856 417f77 _malloc 46 API calls 85853->85856 85854->85843 85854->85852 85854->85853 85854->85859 85855->85847 85858 420494 __lseeki64_nolock 48 API calls 85855->85858 85856->85843 85857->85844 85861 420494 __lseeki64_nolock 48 API calls 85857->85861 85858->85855 85859->85850 85862 420494 __lseeki64_nolock 48 API calls 85860->85862 85861->85857 85863 41dde9 85862->85863 85863->85850 85864->85748 85865->85760 85866->85749 85867->85756 85868->85760 85869->85759 85870->85756 85871->85768 85872->85767 85873->85760 85875 416b04 __malloc_crt 46 API calls 85874->85875 85876 420618 85875->85876 85876->85778 85877->85774 85878->85782 85882 4148b3 GetSystemTimeAsFileTime __aulldiv 85879->85882 85881 442c6b 85881->85388 85882->85881 85883->85395 85884->85401 85885->85401 85890 45272f __tzset_nolock _wcscpy 85886->85890 85887 414d04 61 API calls __fread_nolock 85887->85890 85888 44afef GetSystemTimeAsFileTime 85888->85890 85889 4528a4 85889->85309 85889->85310 85890->85887 85890->85888 85890->85889 85891 4150d1 81 API calls _fseek 85890->85891 85891->85890 85893 44b1bc 85892->85893 85894 44b1ca 85892->85894 85895 4149c2 116 API calls 85893->85895 85896 44b1e1 85894->85896 85897 4149c2 116 API calls 85894->85897 85898 44b1d8 85894->85898 85895->85894 85927 4321a4 85896->85927 85899 44b2db 85897->85899 85898->85337 85899->85896 85901 44b2e9 85899->85901 85906 414a46 __fcloseall 82 API calls 85901->85906 85910 44b2f6 85901->85910 85902 44b224 85903 44b253 85902->85903 85904 44b228 85902->85904 85931 43213d 85903->85931 85905 44b235 85904->85905 85908 414a46 __fcloseall 82 API calls 85904->85908 85909 44b245 85905->85909 85912 414a46 __fcloseall 82 API calls 85905->85912 85906->85910 85908->85905 85909->85337 85910->85337 85911 44b25a 85913 44b260 85911->85913 85914 44b289 85911->85914 85912->85909 85916 44b26d 85913->85916 85919 414a46 __fcloseall 82 API calls 85913->85919 85941 44b0bf 85914->85941 85917 44b27d 85916->85917 85920 414a46 __fcloseall 82 API calls 85916->85920 85917->85337 85918 44b28f 85950 4320f8 85918->85950 85919->85916 85920->85917 85923 44b2a2 85925 44b2b2 85923->85925 85926 414a46 __fcloseall 82 API calls 85923->85926 85924 414a46 __fcloseall 82 API calls 85924->85923 85925->85337 85926->85925 85928 4321cb 85927->85928 85930 4321b4 __tzset_nolock _memmove 85927->85930 85929 414d04 __fread_nolock 61 API calls 85928->85929 85929->85930 85930->85902 85932 4135bb _malloc 46 API calls 85931->85932 85933 432150 85932->85933 85934 4135bb _malloc 46 API calls 85933->85934 85935 432162 85934->85935 85936 4135bb _malloc 46 API calls 85935->85936 85937 432174 85936->85937 85938 4320f8 46 API calls 85937->85938 85940 432189 85937->85940 85939 432198 85938->85939 85939->85911 85940->85911 85942 44b18e 85941->85942 85946 44b0da 85941->85946 85960 43206e 79 API calls 85942->85960 85944 442caf 61 API calls 85944->85946 85945 44b194 85945->85918 85946->85942 85946->85944 85949 44b19d 85946->85949 85958 44b040 61 API calls 85946->85958 85959 442d48 79 API calls 85946->85959 85949->85918 85951 43210f 85950->85951 85952 432109 85950->85952 85954 432122 85951->85954 85955 413748 _free 46 API calls 85951->85955 85953 413748 _free 46 API calls 85952->85953 85953->85951 85956 432135 85954->85956 85957 413748 _free 46 API calls 85954->85957 85955->85954 85956->85923 85956->85924 85957->85956 85958->85946 85959->85946 85960->85945 85961->85239 85962->85242 85963->85256 85964->85256 85965->85256 85966->85259 85967->85256 85968->85256 85969->85264 85970->85273 85971->85275 85972->85275 86022 410160 85973->86022 85975 41012f GetFullPathNameW 85976 410147 moneypunct 85975->85976 85976->85096 85978 4102cb SHGetDesktopFolder 85977->85978 85981 410333 _wcsncpy 85977->85981 85979 4102e0 _wcsncpy 85978->85979 85978->85981 85980 41031c SHGetPathFromIDListW 85979->85980 85979->85981 85980->85981 85981->85098 85983 4101bb 85982->85983 85990 425f4a 85982->85990 85984 410160 52 API calls 85983->85984 85985 4101c7 85984->85985 86026 410200 52 API calls 2 library calls 85985->86026 85986 4114ab __wcsicoll 58 API calls 85986->85990 85988 4101d6 86027 410200 52 API calls 2 library calls 85988->86027 85989 425f6e 85989->85101 85990->85986 85990->85989 85992 4101e9 85992->85101 85994 40f760 126 API calls 85993->85994 85995 40f584 85994->85995 85996 429335 85995->85996 85997 40f58c 85995->85997 86000 4528bd 118 API calls 85996->86000 85998 40f598 85997->85998 85999 429358 85997->85999 86052 4033c0 113 API calls 7 library calls 85998->86052 86053 434034 86 API calls _wprintf 85999->86053 86003 42934b 86000->86003 86004 429373 86003->86004 86005 42934f 86003->86005 86009 4115d7 52 API calls 86004->86009 86008 431e58 82 API calls 86005->86008 86006 429369 86006->86004 86007 40f5b4 86007->85100 86008->85999 86021 4293c5 moneypunct 86009->86021 86010 42959c 86011 413748 _free 46 API calls 86010->86011 86012 4295a5 86011->86012 86013 431e58 82 API calls 86012->86013 86014 4295b1 86013->86014 86018 401b10 52 API calls 86018->86021 86021->86010 86021->86018 86028 444af8 86021->86028 86031 44b41c 86021->86031 86038 402780 86021->86038 86046 4022d0 86021->86046 86054 44c7dd 64 API calls 3 library calls 86021->86054 86023 410167 _wcslen 86022->86023 86024 4115d7 52 API calls 86023->86024 86025 41017e _wcscpy 86024->86025 86025->85975 86026->85988 86027->85992 86029 4115d7 52 API calls 86028->86029 86030 444b27 _memmove 86029->86030 86030->86021 86032 44b429 86031->86032 86033 4115d7 52 API calls 86032->86033 86034 44b440 86033->86034 86035 44b45e 86034->86035 86036 401b10 52 API calls 86034->86036 86035->86021 86037 44b453 86036->86037 86037->86021 86039 402790 moneypunct _memmove 86038->86039 86040 402827 86038->86040 86041 4115d7 52 API calls 86039->86041 86042 4115d7 52 API calls 86040->86042 86043 402797 86041->86043 86042->86039 86044 4115d7 52 API calls 86043->86044 86045 4027bd 86043->86045 86044->86045 86045->86021 86047 4022e0 86046->86047 86049 40239d 86046->86049 86048 4115d7 52 API calls 86047->86048 86047->86049 86050 402320 moneypunct 86047->86050 86048->86050 86049->86021 86050->86049 86051 4115d7 52 API calls 86050->86051 86051->86050 86052->86007 86053->86006 86054->86021 86056 402417 86055->86056 86057 402539 moneypunct 86055->86057 86056->86057 86058 4115d7 52 API calls 86056->86058 86057->85105 86059 402443 86058->86059 86060 4115d7 52 API calls 86059->86060 86061 4024b4 86060->86061 86061->86057 86063 4022d0 52 API calls 86061->86063 86084 402880 95 API calls 2 library calls 86061->86084 86063->86061 86069 401566 86064->86069 86065 401794 86085 40e9a0 90 API calls 86065->86085 86068 40167a 86071 4017c0 86068->86071 86086 45e737 90 API calls 3 library calls 86068->86086 86069->86065 86069->86068 86070 4010a0 52 API calls 86069->86070 86070->86069 86071->85107 86073 40bc70 52 API calls 86072->86073 86082 40d451 86073->86082 86074 40d50f 86089 410600 52 API calls 86074->86089 86076 427c01 86090 45e737 90 API calls 3 library calls 86076->86090 86077 40e0a0 52 API calls 86077->86082 86079 401b10 52 API calls 86079->86082 86080 40d519 86080->85110 86082->86074 86082->86076 86082->86077 86082->86079 86082->86080 86087 40f310 53 API calls 86082->86087 86088 40d860 91 API calls 86082->86088 86084->86061 86085->86068 86086->86071 86087->86082 86088->86082 86089->86080 86090->86080 86092 410521 LoadIconW 86091->86092 86094 40d651 86092->86094 86094->85125 86095->85124 86097 42c5fe 86096->86097 86112 4091c6 86096->86112 86098 40bc70 52 API calls 86097->86098 86097->86112 86099 42c64e InterlockedIncrement 86098->86099 86100 42c665 86099->86100 86106 42c697 86099->86106 86102 42c672 InterlockedDecrement Sleep InterlockedIncrement 86100->86102 86100->86106 86101 42c737 InterlockedDecrement 86103 42c74a 86101->86103 86102->86100 86102->86106 86105 408f40 VariantClear 86103->86105 86104 42c731 86104->86101 86107 42c752 86105->86107 86106->86101 86106->86104 86389 408e80 86106->86389 86398 410c60 VariantClear moneypunct 86107->86398 86112->85184 86113 42c6db 86114 402160 52 API calls 86113->86114 86115 42c6e5 86114->86115 86394 45340c 85 API calls 86115->86394 86117 42c6f1 86395 40d200 52 API calls 2 library calls 86117->86395 86119 42c6fb 86396 465124 53 API calls 86119->86396 86121 42c715 86122 42c76a 86121->86122 86123 42c719 86121->86123 86124 401b10 52 API calls 86122->86124 86397 46fe32 VariantClear 86123->86397 86126 42c77e 86124->86126 86127 401980 53 API calls 86126->86127 86133 42c796 86127->86133 86128 42c812 86400 46fe32 VariantClear 86128->86400 86130 42c82a InterlockedDecrement 86401 46ff07 54 API calls 86130->86401 86132 42c864 86402 45e737 90 API calls 3 library calls 86132->86402 86133->86128 86133->86132 86399 40ba10 52 API calls 2 library calls 86133->86399 86134 42c9ec 86445 47d33e 328 API calls 86134->86445 86138 42c9fe 86446 46feb1 VariantClear VariantClear 86138->86446 86140 401980 53 API calls 86144 42c849 86140->86144 86141 42ca08 86142 42c874 86146 408f40 VariantClear 86142->86146 86153 42ca59 86142->86153 86143 408f40 VariantClear 86143->86144 86144->86134 86144->86140 86144->86143 86147 402780 52 API calls 86144->86147 86404 40a780 86144->86404 86149 42c891 86146->86149 86147->86144 86403 410c60 VariantClear moneypunct 86149->86403 86153->86153 86155 40afc4 86154->86155 86156 40b156 86154->86156 86157 40afd5 86155->86157 86158 42d1e3 86155->86158 86456 45e737 90 API calls 3 library calls 86156->86456 86162 40b11a moneypunct 86157->86162 86163 40a780 194 API calls 86157->86163 86457 45e737 90 API calls 3 library calls 86158->86457 86161 40b143 86161->85184 86162->86161 86460 45e737 90 API calls 3 library calls 86162->86460 86165 40b00a 86163->86165 86164 42d1f8 86168 408f40 VariantClear 86164->86168 86165->86164 86169 40b012 86165->86169 86167 42d4db 86167->86167 86168->86161 86170 40b04a 86169->86170 86171 42d231 VariantClear 86169->86171 86176 40b094 moneypunct 86169->86176 86174 40b05c moneypunct 86170->86174 86458 40e270 VariantClear moneypunct 86170->86458 86171->86174 86172 40b108 86172->86162 86459 40e270 VariantClear moneypunct 86172->86459 86173 42d425 moneypunct 86173->86162 86175 42d45a VariantClear 86173->86175 86174->86176 86178 4115d7 52 API calls 86174->86178 86175->86162 86176->86172 86176->86173 86178->86176 86181 408fff 86180->86181 86194 40900d 86180->86194 86461 403ea0 52 API calls __cinit 86181->86461 86184 42c3f6 86464 45e737 90 API calls 3 library calls 86184->86464 86186 40a780 194 API calls 86186->86194 86187 42c44a 86466 45e737 90 API calls 3 library calls 86187->86466 86189 42c47b 86467 451b42 61 API calls 86189->86467 86191 42c4cb 86469 47faae 233 API calls 86191->86469 86192 42c564 86196 408f40 VariantClear 86192->86196 86194->86184 86194->86186 86194->86187 86194->86189 86194->86191 86194->86192 86200 4090df 86194->86200 86202 42c528 86194->86202 86203 409112 86194->86203 86204 42c548 86194->86204 86207 4090ea 86194->86207 86213 4090f2 moneypunct 86194->86213 86463 4534e3 52 API calls 86194->86463 86465 40c4e0 194 API calls 86194->86465 86196->86213 86197 42c491 86197->86213 86468 45e737 90 API calls 3 library calls 86197->86468 86198 42c4da 86198->86213 86470 45e737 90 API calls 3 library calls 86198->86470 86200->86207 86208 408e80 VariantClear 86200->86208 86471 45e737 90 API calls 3 library calls 86202->86471 86203->86204 86205 40912b 86203->86205 86472 45e737 90 API calls 3 library calls 86204->86472 86205->86213 86462 403e10 53 API calls 86205->86462 86210 408f40 VariantClear 86207->86210 86208->86207 86210->86213 86212 40914b 86214 408f40 VariantClear 86212->86214 86213->85184 86214->86213 86473 408d90 86215->86473 86217 429778 86500 410c60 VariantClear moneypunct 86217->86500 86219 429780 86220 408cf9 86220->86217 86221 42976c 86220->86221 86223 408d2d 86220->86223 86499 45e737 90 API calls 3 library calls 86221->86499 86489 403d10 86223->86489 86226 408d71 moneypunct 86226->85184 86227 408f40 VariantClear 86228 408d45 moneypunct 86227->86228 86228->86226 86228->86227 86230 425c87 86229->86230 86231 40d15f 86229->86231 86232 425cc7 86230->86232 86233 425ca1 TranslateAcceleratorW 86230->86233 86231->85184 86233->86231 86235 42602f 86234->86235 86238 40d17f 86234->86238 86235->85184 86236 40d18c 86236->85184 86237 42608e IsDialogMessageW 86237->86236 86237->86238 86238->86236 86238->86237 86776 430c46 GetClassLongW 86238->86776 86241 4096c6 _wcslen 86240->86241 86242 4115d7 52 API calls 86241->86242 86306 40a70c moneypunct _memmove 86241->86306 86243 4096fa _memmove 86242->86243 86244 4115d7 52 API calls 86243->86244 86246 40971b 86244->86246 86245 4013a0 52 API calls 86247 4297aa 86245->86247 86248 409749 CharUpperBuffW 86246->86248 86252 40976a moneypunct 86246->86252 86246->86306 86249 4115d7 52 API calls 86247->86249 86248->86252 86257 4297d1 _memmove 86249->86257 86290 4097e5 moneypunct 86252->86290 86778 47dcbb 196 API calls 86252->86778 86253 408f40 VariantClear 86254 42ae92 86253->86254 86805 410c60 VariantClear moneypunct 86254->86805 86256 42aea4 86804 45e737 90 API calls 3 library calls 86257->86804 86258 409aa2 86258->86257 86260 4115d7 52 API calls 86258->86260 86264 409afe 86258->86264 86259 40a689 86261 4115d7 52 API calls 86259->86261 86260->86264 86281 40a6af moneypunct _memmove 86261->86281 86262 409b2a 86266 429dbe 86262->86266 86330 409b4d moneypunct _memmove 86262->86330 86786 40b400 VariantClear VariantClear moneypunct 86262->86786 86263 40c2c0 52 API calls 86263->86290 86264->86262 86265 4115d7 52 API calls 86264->86265 86267 429d31 86265->86267 86272 429dd3 86266->86272 86787 40b400 VariantClear VariantClear moneypunct 86266->86787 86271 429d42 86267->86271 86783 44a801 52 API calls 86267->86783 86268 429a46 VariantClear 86268->86290 86269 409fd2 86276 40a045 86269->86276 86326 42a3f5 86269->86326 86279 40e0a0 52 API calls 86271->86279 86272->86330 86788 40e1c0 VariantClear moneypunct 86272->86788 86273 408f40 VariantClear 86273->86290 86283 4115d7 52 API calls 86276->86283 86277 4115d7 52 API calls 86277->86290 86285 429d57 86279->86285 86289 4115d7 52 API calls 86281->86289 86284 40a04c 86283->86284 86291 40a0a7 86284->86291 86294 4091e0 314 API calls 86284->86294 86784 453443 52 API calls 86285->86784 86287 42a42f 86792 45e737 90 API calls 3 library calls 86287->86792 86289->86306 86290->86257 86290->86258 86290->86259 86290->86263 86290->86268 86290->86273 86290->86277 86290->86281 86292 4299d9 86290->86292 86295 429abd 86290->86295 86303 40a780 194 API calls 86290->86303 86304 42a452 86290->86304 86779 40c4e0 194 API calls 86290->86779 86781 40ba10 52 API calls 2 library calls 86290->86781 86782 40e270 VariantClear moneypunct 86290->86782 86311 40a0af 86291->86311 86793 40c790 VariantClear moneypunct 86291->86793 86296 408f40 VariantClear 86292->86296 86294->86291 86295->85184 86298 4299e2 86296->86298 86297 429d88 86785 453443 52 API calls 86297->86785 86780 410c60 VariantClear moneypunct 86298->86780 86303->86290 86304->86253 86306->86245 86307 402780 52 API calls 86307->86330 86308 4115d7 52 API calls 86308->86330 86310 408f40 VariantClear 86341 40a162 moneypunct _memmove 86310->86341 86312 40a11b 86311->86312 86313 42a4b4 VariantClear 86311->86313 86311->86341 86319 40a12d moneypunct 86312->86319 86794 40e270 VariantClear moneypunct 86312->86794 86313->86319 86314 40a780 194 API calls 86314->86330 86316 401980 53 API calls 86316->86330 86317 408e80 VariantClear 86317->86330 86318 4115d7 52 API calls 86318->86341 86319->86318 86319->86341 86320 408e80 VariantClear 86320->86341 86322 44a801 52 API calls 86322->86330 86323 42a74d VariantClear 86323->86341 86324 41130a 51 API calls __cinit 86324->86330 86325 40a368 86327 42aad4 86325->86327 86335 40a397 86325->86335 86791 47390f VariantClear 86326->86791 86797 46fe90 VariantClear VariantClear moneypunct 86327->86797 86328 42a886 VariantClear 86328->86341 86329 42a7e4 VariantClear 86329->86341 86330->86269 86330->86287 86330->86306 86330->86307 86330->86308 86330->86314 86330->86316 86330->86317 86330->86322 86330->86324 86330->86326 86332 409c95 86330->86332 86789 45f508 52 API calls 86330->86789 86790 403e10 53 API calls 86330->86790 86332->85184 86333 40a3ce 86345 40a3d9 moneypunct 86333->86345 86798 40b400 VariantClear VariantClear moneypunct 86333->86798 86334 40e270 VariantClear 86334->86341 86335->86333 86360 40a42c moneypunct 86335->86360 86777 40b400 VariantClear VariantClear moneypunct 86335->86777 86338 4115d7 52 API calls 86338->86341 86339 42abaf 86343 42abd4 VariantClear 86339->86343 86351 40a4ee moneypunct 86339->86351 86340 4115d7 52 API calls 86344 42a5a6 VariantInit VariantCopy 86340->86344 86341->86310 86341->86320 86341->86323 86341->86325 86341->86327 86341->86328 86341->86329 86341->86334 86341->86338 86341->86340 86795 470870 52 API calls 86341->86795 86796 44ccf1 VariantClear moneypunct 86341->86796 86342 40a4dc 86342->86351 86800 40e270 VariantClear moneypunct 86342->86800 86343->86351 86344->86341 86347 42a5c6 VariantClear 86344->86347 86346 40a41a 86345->86346 86353 42ab44 VariantClear 86345->86353 86345->86360 86346->86360 86799 40e270 VariantClear moneypunct 86346->86799 86347->86341 86348 42ac4f 86354 42ac79 VariantClear 86348->86354 86358 40a546 moneypunct 86348->86358 86351->86348 86352 40a534 86351->86352 86352->86358 86801 40e270 VariantClear moneypunct 86352->86801 86353->86360 86354->86358 86355 42ad28 86361 42ad4e VariantClear 86355->86361 86366 40a583 moneypunct 86355->86366 86358->86355 86359 40a571 86358->86359 86359->86366 86802 40e270 VariantClear moneypunct 86359->86802 86360->86339 86360->86342 86361->86366 86363 40a650 moneypunct 86363->85184 86364 42ae0e VariantClear 86364->86366 86366->86363 86366->86364 86803 40e270 VariantClear moneypunct 86366->86803 86367->85184 86368->85132 86369->85136 86370->85184 86371->85184 86372->85184 86373->85184 86374->85190 86375->85190 86376->85190 86377->85190 86378->85190 86379->85190 86380->85190 86382 403cdf 86381->86382 86383 408f40 VariantClear 86382->86383 86384 403ce7 86383->86384 86384->85178 86385->85190 86386->85190 86387->85184 86388->85142 86390 408e88 86389->86390 86392 408e94 86389->86392 86391 408f40 VariantClear 86390->86391 86391->86392 86393 45340c 85 API calls 86392->86393 86393->86113 86394->86117 86395->86119 86396->86121 86397->86104 86398->86112 86399->86133 86400->86130 86401->86144 86402->86142 86403->86112 86405 40a7a6 86404->86405 86406 40ae8c 86404->86406 86407 4115d7 52 API calls 86405->86407 86447 41130a 51 API calls __cinit 86406->86447 86427 40a7c6 moneypunct _memmove 86407->86427 86409 40a86d 86410 40abd1 86409->86410 86424 40a878 moneypunct 86409->86424 86412 401b10 52 API calls 86412->86427 86413 42b791 VariantClear 86413->86427 86414 40bc10 53 API calls 86414->86427 86415 408e80 VariantClear 86415->86427 86417 4115d7 52 API calls 86417->86427 86418 42ba2d VariantClear 86418->86427 86419 42b459 VariantClear 86419->86427 86421 408cc0 187 API calls 86421->86427 86423 42b6f6 VariantClear 86423->86427 86425 40e270 VariantClear 86425->86427 86426 42bbf5 86427->86409 86427->86410 86427->86412 86427->86413 86427->86414 86427->86415 86427->86417 86427->86418 86427->86419 86427->86421 86427->86423 86427->86425 86427->86426 86429 4115d7 52 API calls 86427->86429 86430 40b5f0 89 API calls 86427->86430 86434 42bb6a 86427->86434 86435 408f40 VariantClear 86427->86435 86439 42bc37 86427->86439 86444 4530c9 VariantClear 86427->86444 86448 45308a 53 API calls 86427->86448 86449 470870 52 API calls 86427->86449 86450 457f66 87 API calls __write_nolock 86427->86450 86451 472f47 127 API calls 86427->86451 86430->86427 86435->86427 86444->86427 86445->86138 86446->86141 86447->86427 86448->86427 86449->86427 86450->86427 86451->86427 86456->86158 86457->86164 86458->86174 86459->86162 86460->86167 86461->86194 86462->86212 86463->86194 86464->86213 86465->86194 86466->86213 86467->86197 86468->86213 86469->86198 86470->86213 86471->86213 86472->86192 86474 4289d2 86473->86474 86475 408db3 86473->86475 86503 45e737 90 API calls 3 library calls 86474->86503 86501 40bec0 90 API calls 86475->86501 86478 4289e5 86504 45e737 90 API calls 3 library calls 86478->86504 86479 408e5a 86479->86220 86481 428a05 86483 408f40 VariantClear 86481->86483 86483->86479 86484 40a780 194 API calls 86485 408dc9 86484->86485 86485->86478 86485->86479 86485->86481 86485->86484 86486 408e64 86485->86486 86488 408f40 VariantClear 86485->86488 86502 40ba10 52 API calls 2 library calls 86485->86502 86487 408f40 VariantClear 86486->86487 86487->86479 86488->86485 86490 408f40 VariantClear 86489->86490 86491 403d20 86490->86491 86492 403cd0 VariantClear 86491->86492 86493 403d4d 86492->86493 86505 4755ad 86493->86505 86508 45e17d 86493->86508 86518 46e91c 86493->86518 86521 467897 86493->86521 86494 403d76 86494->86217 86494->86228 86499->86217 86500->86219 86501->86485 86502->86485 86503->86478 86504->86481 86565 475077 86505->86565 86507 4755c0 86507->86494 86509 45e198 86508->86509 86510 45e19c 86509->86510 86511 45e1b8 86509->86511 86512 408f40 VariantClear 86510->86512 86513 45e1cc 86511->86513 86514 45e1db FindClose 86511->86514 86515 45e1a4 86512->86515 86516 45e1d9 moneypunct 86513->86516 86671 44ae3e 86513->86671 86514->86516 86515->86494 86516->86494 86686 46e785 86518->86686 86520 46e92f 86520->86494 86522 4678bb 86521->86522 86552 467954 86522->86552 86770 45340c 85 API calls 86522->86770 86523 4115d7 52 API calls 86524 467989 86523->86524 86526 467995 86524->86526 86774 40da60 53 API calls 86524->86774 86530 4533eb 85 API calls 86526->86530 86527 4678f6 86529 413a0e __wsplitpath 46 API calls 86527->86529 86531 4678fc 86529->86531 86532 4679b7 86530->86532 86533 401b10 52 API calls 86531->86533 86534 40de40 60 API calls 86532->86534 86535 46790c 86533->86535 86536 4679c3 86534->86536 86771 40d200 52 API calls 2 library calls 86535->86771 86538 4679c7 GetLastError 86536->86538 86539 467a05 86536->86539 86541 403cd0 VariantClear 86538->86541 86542 467a2c 86539->86542 86543 467a4b 86539->86543 86540 467917 86540->86552 86772 4339fa GetFileAttributesW FindFirstFileW FindClose 86540->86772 86544 4679dc 86541->86544 86546 4115d7 52 API calls 86542->86546 86547 4115d7 52 API calls 86543->86547 86548 4679e6 86544->86548 86556 44ae3e CloseHandle 86544->86556 86554 467a31 86546->86554 86555 467a49 86547->86555 86551 408f40 VariantClear 86548->86551 86549 467928 86550 46792f 86549->86550 86549->86552 86773 4335cd 56 API calls 3 library calls 86550->86773 86558 4679ed 86551->86558 86552->86523 86553 467964 86552->86553 86553->86494 86775 436299 52 API calls 2 library calls 86554->86775 86560 408f40 VariantClear 86555->86560 86556->86548 86558->86494 86562 467a88 86560->86562 86561 467939 86561->86552 86563 408f40 VariantClear 86561->86563 86562->86494 86564 467947 86563->86564 86564->86552 86618 4533eb 86565->86618 86568 4750ee 86570 408f40 VariantClear 86568->86570 86569 475129 86622 4646e0 86569->86622 86578 4750f5 86570->86578 86572 47515e 86573 475162 86572->86573 86598 47518e 86572->86598 86574 408f40 VariantClear 86573->86574 86596 475169 86574->86596 86575 475357 86576 475365 86575->86576 86577 4754ea 86575->86577 86656 44b3ac 57 API calls 86576->86656 86662 464812 92 API calls 86577->86662 86578->86507 86582 4754fc 86583 475374 86582->86583 86584 475508 86582->86584 86635 430d31 86583->86635 86585 4533eb 85 API calls 86585->86598 86593 475480 86594 408f40 VariantClear 86593->86594 86594->86596 86596->86507 86598->86575 86598->86585 86598->86593 86604 4754b5 86598->86604 86654 436299 52 API calls 2 library calls 86598->86654 86655 463ad5 64 API calls __wcsicoll 86598->86655 86606 408f40 VariantClear 86604->86606 86606->86596 86619 453404 86618->86619 86620 4533f8 86618->86620 86619->86568 86619->86569 86620->86619 86665 4531b1 85 API calls 5 library calls 86620->86665 86666 4536f7 53 API calls 86622->86666 86624 4646fc 86667 4426cd 59 API calls _wcslen 86624->86667 86626 464711 86628 40bc70 52 API calls 86626->86628 86634 46474b 86626->86634 86629 46472c 86628->86629 86668 461465 52 API calls _memmove 86629->86668 86631 464741 86632 40c600 52 API calls 86631->86632 86632->86634 86633 464793 86633->86572 86634->86633 86669 463ad5 64 API calls __wcsicoll 86634->86669 86654->86598 86655->86598 86656->86583 86662->86582 86665->86619 86666->86624 86667->86626 86668->86631 86669->86633 86673 44ae4b moneypunct 86671->86673 86674 443fdf 86671->86674 86673->86516 86679 40da20 86674->86679 86676 443feb 86683 4340db 86676->86683 86678 444001 86678->86673 86680 40da37 86679->86680 86681 40da29 86679->86681 86680->86681 86682 40da3c CloseHandle 86680->86682 86681->86676 86682->86676 86684 40da20 CloseHandle 86683->86684 86685 4340e7 moneypunct 86684->86685 86685->86678 86687 46e7a2 86686->86687 86688 4115d7 52 API calls 86687->86688 86691 46e802 86687->86691 86689 46e7ad 86688->86689 86690 46e7b9 86689->86690 86734 40da60 53 API calls 86689->86734 86696 4533eb 85 API calls 86690->86696 86692 46e7e5 86691->86692 86699 46e82f 86691->86699 86693 408f40 VariantClear 86692->86693 86695 46e7ea 86693->86695 86695->86520 86697 46e7ca 86696->86697 86735 40de40 86697->86735 86698 46e8b5 86727 4680ed 86698->86727 86699->86698 86702 46e845 86699->86702 86705 4533eb 85 API calls 86702->86705 86704 46e8bb 86731 443fbe 86704->86731 86712 46e84b 86705->86712 86708 46e87a 86747 4689f4 59 API calls 86708->86747 86709 46e883 86713 4013c0 52 API calls 86709->86713 86712->86708 86712->86709 86715 46e88f 86713->86715 86716 40e0a0 52 API calls 86715->86716 86718 46e899 86716->86718 86717 408f40 VariantClear 86725 46e881 86717->86725 86748 40d200 52 API calls 2 library calls 86718->86748 86719 46e911 86719->86520 86721 40da20 CloseHandle 86724 46e903 86721->86724 86722 46e8a5 86749 4689f4 59 API calls 86722->86749 86726 44ae3e CloseHandle 86724->86726 86725->86719 86725->86721 86726->86719 86728 468100 86727->86728 86729 4680fa 86727->86729 86728->86704 86750 467ac4 55 API calls 2 library calls 86729->86750 86751 443e36 86731->86751 86733 443fd3 86733->86717 86733->86725 86734->86690 86736 40da20 CloseHandle 86735->86736 86737 40de4e 86736->86737 86758 40f110 86737->86758 86740 4264fa 86742 40de84 86767 40e080 SetFilePointerEx SetFilePointerEx 86742->86767 86744 40de8b 86768 40f160 SetFilePointerEx SetFilePointerEx WriteFile 86744->86768 86747->86725 86748->86722 86749->86725 86750->86728 86754 443e19 86751->86754 86755 443e26 86754->86755 86756 443e32 WriteFile 86754->86756 86757 443db4 SetFilePointerEx SetFilePointerEx 86755->86757 86756->86733 86757->86756 86759 40f125 CreateFileW 86758->86759 86760 42630c 86758->86760 86762 40de74 86759->86762 86761 426311 CreateFileW 86760->86761 86760->86762 86761->86762 86763 426337 86761->86763 86762->86740 86766 40dea0 55 API calls moneypunct 86762->86766 86769 40df90 SetFilePointerEx SetFilePointerEx 86763->86769 86765 426342 86765->86762 86766->86742 86767->86744 86769->86765 86770->86527 86771->86540 86772->86549 86773->86561 86774->86526 86775->86555 86776->86238 86777->86333 86778->86252 86779->86290 86780->86363 86781->86290 86782->86290 86783->86271 86784->86297 86785->86262 86786->86266 86787->86272 86788->86330 86789->86330 86790->86330 86791->86287 86792->86304 86793->86291 86794->86319 86795->86341 86796->86341 86797->86333 86798->86345 86799->86360 86800->86351 86801->86358 86802->86366 86803->86366 86804->86304 86805->86256 86806 42d154 86810 480a8d 86806->86810 86808 42d161 86809 480a8d 194 API calls 86808->86809 86809->86808 86811 480ae4 86810->86811 86812 480b26 86810->86812 86814 480aeb 86811->86814 86815 480b15 86811->86815 86813 40bc70 52 API calls 86812->86813 86825 480b2e 86813->86825 86817 480aee 86814->86817 86818 480b04 86814->86818 86843 4805bf 194 API calls 86815->86843 86817->86812 86819 480af3 86817->86819 86842 47fea2 194 API calls __itow_s 86818->86842 86841 47f135 194 API calls 86819->86841 86822 40e0a0 52 API calls 86822->86825 86824 408f40 VariantClear 86826 481156 86824->86826 86825->86822 86827 480aff 86825->86827 86830 401980 53 API calls 86825->86830 86832 40c2c0 52 API calls 86825->86832 86833 480ff5 86825->86833 86834 40e710 53 API calls 86825->86834 86835 40a780 194 API calls 86825->86835 86837 408e80 VariantClear 86825->86837 86844 45377f 52 API calls 86825->86844 86845 45e951 53 API calls 86825->86845 86846 40e830 53 API calls 86825->86846 86847 47925f 53 API calls 86825->86847 86848 47fcff 194 API calls 86825->86848 86828 408f40 VariantClear 86826->86828 86827->86824 86829 48115e 86828->86829 86829->86808 86830->86825 86832->86825 86849 45e737 90 API calls 3 library calls 86833->86849 86834->86825 86835->86825 86837->86825 86841->86827 86842->86827 86843->86827 86844->86825 86845->86825 86846->86825 86847->86825 86848->86825 86849->86827 86850 42b14b 86857 40bc10 86850->86857 86852 42b159 86853 4096a0 328 API calls 86852->86853 86854 42b177 86853->86854 86868 44b92d VariantClear 86854->86868 86856 42bc5b 86858 40bc24 86857->86858 86859 40bc17 86857->86859 86861 40bc2a 86858->86861 86862 40bc3c 86858->86862 86860 408e80 VariantClear 86859->86860 86865 40bc1f 86860->86865 86863 408e80 VariantClear 86861->86863 86864 4115d7 52 API calls 86862->86864 86866 40bc33 86863->86866 86867 40bc43 86864->86867 86865->86852 86866->86852 86867->86852 86868->86856 86869 425b2b 86874 40f000 86869->86874 86873 425b3a 86875 4115d7 52 API calls 86874->86875 86876 40f007 86875->86876 86877 4276ea 86876->86877 86883 40f030 86876->86883 86882 41130a 51 API calls __cinit 86882->86873 86884 40f039 86883->86884 86885 40f01a 86883->86885 86913 41130a 51 API calls __cinit 86884->86913 86887 40e500 86885->86887 86888 40bc70 52 API calls 86887->86888 86889 40e515 GetVersionExW 86888->86889 86890 402160 52 API calls 86889->86890 86891 40e557 86890->86891 86914 40e660 86891->86914 86897 427674 86901 4276c6 GetSystemInfo 86897->86901 86899 40e5e0 86902 4276d5 GetSystemInfo 86899->86902 86928 40efd0 86899->86928 86900 40e5cd GetCurrentProcess 86935 40ef20 LoadLibraryA GetProcAddress 86900->86935 86901->86902 86906 40e629 86932 40ef90 86906->86932 86909 40e641 FreeLibrary 86910 40e644 86909->86910 86911 40e653 FreeLibrary 86910->86911 86912 40e656 86910->86912 86911->86912 86912->86882 86913->86885 86915 40e667 86914->86915 86916 42761d 86915->86916 86917 40c600 52 API calls 86915->86917 86918 40e55c 86917->86918 86919 40e680 86918->86919 86920 40e687 86919->86920 86921 427616 86920->86921 86922 40c600 52 API calls 86920->86922 86923 40e566 86922->86923 86923->86897 86924 40ef60 86923->86924 86925 40e5c8 86924->86925 86926 40ef66 LoadLibraryA 86924->86926 86925->86899 86925->86900 86926->86925 86927 40ef77 GetProcAddress 86926->86927 86927->86925 86929 40e620 86928->86929 86930 40efd6 LoadLibraryA 86928->86930 86929->86901 86929->86906 86930->86929 86931 40efe7 GetProcAddress 86930->86931 86931->86929 86936 40efb0 LoadLibraryA GetProcAddress 86932->86936 86934 40e632 GetNativeSystemInfo 86934->86909 86934->86910 86935->86899 86936->86934 86937 425b5e 86942 40c7f0 86937->86942 86941 425b6d 86977 40db10 52 API calls 86942->86977 86944 40c82a 86978 410ab0 6 API calls 86944->86978 86946 40c86d 86947 40bc70 52 API calls 86946->86947 86948 40c877 86947->86948 86949 40bc70 52 API calls 86948->86949 86950 40c881 86949->86950 86951 40bc70 52 API calls 86950->86951 86952 40c88b 86951->86952 86953 40bc70 52 API calls 86952->86953 86954 40c8d1 86953->86954 86955 40bc70 52 API calls 86954->86955 86956 40c991 86955->86956 86979 40d2c0 52 API calls 86956->86979 86958 40c99b 86980 40d0d0 53 API calls 86958->86980 86960 40c9c1 86961 40bc70 52 API calls 86960->86961 86962 40c9cb 86961->86962 86981 40e310 53 API calls 86962->86981 86964 40ca28 86965 408f40 VariantClear 86964->86965 86966 40ca30 86965->86966 86967 408f40 VariantClear 86966->86967 86968 40ca38 GetStdHandle 86967->86968 86969 429630 86968->86969 86970 40ca87 86968->86970 86969->86970 86971 429639 86969->86971 86976 41130a 51 API calls __cinit 86970->86976 86982 4432c0 57 API calls 86971->86982 86973 429641 86983 44b6ab CreateThread 86973->86983 86975 42964f CloseHandle 86975->86970 86976->86941 86977->86944 86978->86946 86979->86958 86980->86960 86981->86964 86982->86973 86983->86975 86984 44b5cb 58 API calls 86983->86984 86985 425b6f 86990 40dc90 86985->86990 86989 425b7e 86991 40bc70 52 API calls 86990->86991 86992 40dd03 86991->86992 86998 40f210 86992->86998 86995 40dd96 86996 40ddb7 86995->86996 87001 40dc00 52 API calls 2 library calls 86995->87001 86997 41130a 51 API calls __cinit 86996->86997 86997->86989 87002 40f250 RegOpenKeyExW 86998->87002 87000 40f230 87000->86995 87001->86995 87003 425e17 87002->87003 87004 40f275 RegQueryValueExW 87002->87004 87003->87000 87005 40f2c3 RegCloseKey 87004->87005 87006 40f298 87004->87006 87005->87000 87007 40f2a9 RegCloseKey 87006->87007 87008 425e1d 87006->87008 87007->87000 87009 3ec9a33 87010 3ec9a38 87009->87010 87011 3ec70d8 GetPEB 87010->87011 87012 3ec9a44 87011->87012 87013 3ec9af8 87012->87013 87014 3ec9a62 87012->87014 87031 3eca3a8 9 API calls 87013->87031 87018 3ec9708 87014->87018 87017 3ec9adf 87019 3ec70d8 GetPEB 87018->87019 87020 3ec97a7 87019->87020 87023 3ec9801 VirtualAlloc 87020->87023 87028 3ec97e5 87020->87028 87029 3ec9908 CloseHandle 87020->87029 87030 3ec9918 VirtualFree 87020->87030 87032 3eca618 GetPEB 87020->87032 87022 3ec97d8 CreateFileW 87022->87020 87022->87028 87024 3ec9822 ReadFile 87023->87024 87023->87028 87027 3ec9840 VirtualAlloc 87024->87027 87024->87028 87025 3ec99f4 VirtualFree 87026 3ec9a02 87025->87026 87026->87017 87027->87020 87027->87028 87028->87025 87028->87026 87029->87020 87030->87020 87031->87017 87033 3eca642 87032->87033 87033->87022
                                              APIs
                                              • _wcslen.LIBCMT ref: 004096C1
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • _memmove.LIBCMT ref: 0040970C
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                              • _memmove.LIBCMT ref: 00409D96
                                              • _memmove.LIBCMT ref: 0040A6C4
                                              • _memmove.LIBCMT ref: 004297E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                              • String ID: p@
                                              • API String ID: 2383988440-1482256116
                                              • Opcode ID: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                                              • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                              • Opcode Fuzzy Hash: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                                              • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\shipping documents.exe,00000104,?), ref: 00401F4C
                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                              • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                              • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\shipping documents.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                              • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                              • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                              • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                              • String ID: C:\Users\user\Desktop\shipping documents.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                              • API String ID: 2495805114-1729950802
                                              • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                              • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                              • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                              • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2002 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 2011 40e582-40e583 2002->2011 2012 427674-427679 2002->2012 2015 40e585-40e596 2011->2015 2016 40e5ba-40e5cb call 40ef60 2011->2016 2013 427683-427686 2012->2013 2014 42767b-427681 2012->2014 2018 427693-427696 2013->2018 2019 427688-427691 2013->2019 2017 4276b4-4276be 2014->2017 2020 427625-427629 2015->2020 2021 40e59c-40e59f 2015->2021 2034 40e5ec-40e60c 2016->2034 2035 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2016->2035 2036 4276c6-4276ca GetSystemInfo 2017->2036 2018->2017 2025 427698-4276a8 2018->2025 2019->2017 2027 427636-427640 2020->2027 2028 42762b-427631 2020->2028 2023 40e5a5-40e5ae 2021->2023 2024 427654-427657 2021->2024 2030 40e5b4 2023->2030 2031 427645-42764f 2023->2031 2024->2016 2029 42765d-42766f 2024->2029 2032 4276b0 2025->2032 2033 4276aa-4276ae 2025->2033 2027->2016 2028->2016 2029->2016 2030->2016 2031->2016 2032->2017 2033->2017 2037 40e612-40e623 call 40efd0 2034->2037 2038 4276d5-4276df GetSystemInfo 2034->2038 2035->2034 2046 40e5e8 2035->2046 2036->2038 2037->2036 2043 40e629-40e63f call 40ef90 GetNativeSystemInfo 2037->2043 2048 40e641-40e642 FreeLibrary 2043->2048 2049 40e644-40e651 2043->2049 2046->2034 2048->2049 2050 40e653-40e654 FreeLibrary 2049->2050 2051 40e656-40e65d 2049->2051 2050->2051
                                              APIs
                                              • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                              • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                              • FreeLibrary.KERNEL32(?), ref: 0040E642
                                              • FreeLibrary.KERNEL32(?), ref: 0040E654
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                              • String ID:
                                              • API String ID: 3363477735-0
                                              • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                              • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                              • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                              • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                              APIs
                                              • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                              • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: IsThemeActive$uxtheme.dll
                                              • API String ID: 2574300362-3542929980
                                              • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                              • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                              • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                              • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                              • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                              • TranslateMessage.USER32(?), ref: 00409556
                                              • DispatchMessageW.USER32(?), ref: 00409561
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Message$Peek$DispatchSleepTranslate
                                              • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                              • API String ID: 1762048999-758534266
                                              • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                                              • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                              • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                                              • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\shipping documents.exe,00000104,?), ref: 00401F4C
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • __wcsicoll.LIBCMT ref: 00402007
                                              • __wcsicoll.LIBCMT ref: 0040201D
                                              • __wcsicoll.LIBCMT ref: 00402033
                                                • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                              • __wcsicoll.LIBCMT ref: 00402049
                                              • _wcscpy.LIBCMT ref: 0040207C
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\shipping documents.exe,00000104), ref: 00428B5B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\shipping documents.exe$CMDLINE$CMDLINERAW
                                              • API String ID: 3948761352-4204543812
                                              • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                              • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                              • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                              • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                              Control-flow Graph

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __fread_nolock$_fseek_wcscpy
                                              • String ID: D)E$D)E$FILE
                                              • API String ID: 3888824918-361185794
                                              • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                              • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                              • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                              • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                              • __wsplitpath.LIBCMT ref: 0040E41C
                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                              • _wcsncat.LIBCMT ref: 0040E433
                                              • __wmakepath.LIBCMT ref: 0040E44F
                                                • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                              • _wcscpy.LIBCMT ref: 0040E487
                                                • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                              • _wcscat.LIBCMT ref: 00427541
                                              • _wcslen.LIBCMT ref: 00427551
                                              • _wcslen.LIBCMT ref: 00427562
                                              • _wcscat.LIBCMT ref: 0042757C
                                              • _wcsncpy.LIBCMT ref: 004275BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                              • String ID: Include$\
                                              • API String ID: 3173733714-3429789819
                                              • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                              • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                              • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                              • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                              Control-flow Graph

                                              APIs
                                              • _fseek.LIBCMT ref: 0045292B
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                              • __fread_nolock.LIBCMT ref: 00452961
                                              • __fread_nolock.LIBCMT ref: 00452971
                                              • __fread_nolock.LIBCMT ref: 0045298A
                                              • __fread_nolock.LIBCMT ref: 004529A5
                                              • _fseek.LIBCMT ref: 004529BF
                                              • _malloc.LIBCMT ref: 004529CA
                                              • _malloc.LIBCMT ref: 004529D6
                                              • __fread_nolock.LIBCMT ref: 004529E7
                                              • _free.LIBCMT ref: 00452A17
                                              • _free.LIBCMT ref: 00452A20
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                              • String ID:
                                              • API String ID: 1255752989-0
                                              • Opcode ID: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                              • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                              • Opcode Fuzzy Hash: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                              • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                              • LoadIconW.USER32(?,00000063), ref: 004103C0
                                              • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                              • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                              • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                              • RegisterClassExW.USER32(?), ref: 0041045D
                                                • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                • Part of subcall function 00410490: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 004104FE
                                                • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                                              • String ID: #$0$AutoIt v3
                                              • API String ID: 2880975755-4155596026
                                              • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                              • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                              • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                              • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _malloc
                                              • String ID: Default
                                              • API String ID: 1579825452-753088835
                                              • Opcode ID: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                                              • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                              • Opcode Fuzzy Hash: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                                              • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1904 40f5c0-40f5cf call 422240 1907 40f5d0-40f5e8 1904->1907 1907->1907 1908 40f5ea-40f613 call 413650 call 410e60 1907->1908 1913 40f614-40f633 call 414d04 1908->1913 1916 40f691 1913->1916 1917 40f635-40f63c 1913->1917 1918 40f696-40f69c 1916->1918 1919 40f660-40f674 call 4150d1 1917->1919 1920 40f63e 1917->1920 1924 40f679-40f67c 1919->1924 1921 40f640 1920->1921 1923 40f642-40f650 1921->1923 1925 40f652-40f655 1923->1925 1926 40f67e-40f68c 1923->1926 1924->1913 1927 40f65b-40f65e 1925->1927 1928 425d1e-425d3e call 4150d1 call 414d04 1925->1928 1929 40f68e-40f68f 1926->1929 1930 40f69f-40f6ad 1926->1930 1927->1919 1927->1921 1940 425d43-425d5f call 414d30 1928->1940 1929->1925 1931 40f6b4-40f6c2 1930->1931 1932 40f6af-40f6b2 1930->1932 1934 425d16 1931->1934 1935 40f6c8-40f6d6 1931->1935 1932->1925 1934->1928 1937 425d05-425d0b 1935->1937 1938 40f6dc-40f6df 1935->1938 1937->1923 1941 425d11 1937->1941 1938->1925 1940->1918 1941->1934
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __fread_nolock_fseek_memmove_strcat
                                              • String ID: AU3!$EA06
                                              • API String ID: 1268643489-2658333250
                                              • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                              • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                              • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                              • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                              Control-flow Graph

                                              APIs
                                              • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                              • RegisterClassExW.USER32(00000030), ref: 004104ED
                                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 004104FE
                                              • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Register$BrushClassClipboardColorFormatIconLoad
                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                              • API String ID: 975902462-1005189915
                                              • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                              • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                              • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                              • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1948 3ec9708-3ec97b6 call 3ec70d8 1951 3ec97bd-3ec97e3 call 3eca618 CreateFileW 1948->1951 1954 3ec97ea-3ec97fa 1951->1954 1955 3ec97e5 1951->1955 1962 3ec97fc 1954->1962 1963 3ec9801-3ec981b VirtualAlloc 1954->1963 1956 3ec9935-3ec9939 1955->1956 1958 3ec997b-3ec997e 1956->1958 1959 3ec993b-3ec993f 1956->1959 1964 3ec9981-3ec9988 1958->1964 1960 3ec994b-3ec994f 1959->1960 1961 3ec9941-3ec9944 1959->1961 1965 3ec995f-3ec9963 1960->1965 1966 3ec9951-3ec995b 1960->1966 1961->1960 1962->1956 1967 3ec981d 1963->1967 1968 3ec9822-3ec9839 ReadFile 1963->1968 1969 3ec99dd-3ec99f2 1964->1969 1970 3ec998a-3ec9995 1964->1970 1973 3ec9965-3ec996f 1965->1973 1974 3ec9973 1965->1974 1966->1965 1967->1956 1975 3ec983b 1968->1975 1976 3ec9840-3ec9880 VirtualAlloc 1968->1976 1971 3ec99f4-3ec99ff VirtualFree 1969->1971 1972 3ec9a02-3ec9a0a 1969->1972 1977 3ec9999-3ec99a5 1970->1977 1978 3ec9997 1970->1978 1971->1972 1973->1974 1974->1958 1975->1956 1979 3ec9887-3ec98a2 call 3eca868 1976->1979 1980 3ec9882 1976->1980 1981 3ec99b9-3ec99c5 1977->1981 1982 3ec99a7-3ec99b7 1977->1982 1978->1969 1988 3ec98ad-3ec98b7 1979->1988 1980->1956 1984 3ec99c7-3ec99d0 1981->1984 1985 3ec99d2-3ec99d8 1981->1985 1983 3ec99db 1982->1983 1983->1964 1984->1983 1985->1983 1989 3ec98b9-3ec98e8 call 3eca868 1988->1989 1990 3ec98ea-3ec98fe call 3eca678 1988->1990 1989->1988 1996 3ec9900 1990->1996 1997 3ec9902-3ec9906 1990->1997 1996->1956 1998 3ec9908-3ec990c CloseHandle 1997->1998 1999 3ec9912-3ec9916 1997->1999 1998->1999 2000 3ec9918-3ec9923 VirtualFree 1999->2000 2001 3ec9926-3ec992f 1999->2001 2000->2001 2001->1951 2001->1956
                                              APIs
                                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03EC97D9
                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03EC99FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1724029933.0000000003EC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 03EC7000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3ec7000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateFileFreeVirtual
                                              • String ID:
                                              • API String ID: 204039940-0
                                              • Opcode ID: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                              • Instruction ID: 14c53ba5052ea089fc8e3e2398c8a9fb56b3272d1aabf2178d51d0d1669964e0
                                              • Opcode Fuzzy Hash: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                                              • Instruction Fuzzy Hash: 55A12671E10248EBDB14CFA4C998BEEF7B5BF48304F209299E105BB381C7759A42CB50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2052 401100-401111 2053 401113-401119 2052->2053 2054 401179-401180 2052->2054 2056 401144-40114a 2053->2056 2057 40111b-40111e 2053->2057 2054->2053 2055 401182 2054->2055 2060 40112c-401135 2055->2060 2058 401184-40118e call 401250 2056->2058 2059 40114c-40114f 2056->2059 2057->2056 2061 401120-401126 2057->2061 2072 401193-40119a 2058->2072 2063 401151-401157 2059->2063 2064 40119d 2059->2064 2068 40113c-401141 2060->2068 2061->2060 2062 42b038-42b03f 2061->2062 2062->2060 2071 42b045-42b059 call 401000 call 40e0c0 2062->2071 2069 401219-40121f 2063->2069 2070 40115d 2063->2070 2066 4011a3-4011a9 2064->2066 2067 42afb4-42afc5 call 40f190 2064->2067 2066->2061 2073 4011af 2066->2073 2067->2072 2069->2061 2076 401225-42b06d call 468b0e 2069->2076 2074 401163-401166 2070->2074 2075 42b01d-42b024 2070->2075 2071->2060 2073->2061 2079 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2073->2079 2080 4011db-401202 SetTimer RegisterClipboardFormatW 2073->2080 2082 42afe9-42b018 call 40f190 call 401a50 2074->2082 2083 40116c-401172 2074->2083 2075->2060 2081 42b02a-42b033 call 4370f4 2075->2081 2076->2072 2080->2072 2090 401204-401216 CreatePopupMenu 2080->2090 2081->2060 2082->2060 2083->2061 2092 401174-42afde call 45fd57 2083->2092 2092->2060 2104 42afe4 2092->2104 2104->2072
                                              APIs
                                              • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                              • PostQuitMessage.USER32(00000000), ref: 004011CB
                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 004011F0
                                              • CreatePopupMenu.USER32 ref: 00401204
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Timer$ClipboardCreateFormatKillMenuMessagePopupPostQuitRegister
                                              • String ID: TaskbarCreated
                                              • API String ID: 279767512-2362178303
                                              • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                              • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                              • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                              • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2105 4102b0-4102c5 SHGetMalloc 2106 4102cb-4102da SHGetDesktopFolder 2105->2106 2107 425dfd-425e0e call 433244 2105->2107 2108 4102e0-41031a call 412fba 2106->2108 2109 41036b-410379 2106->2109 2117 410360-410368 2108->2117 2118 41031c-410331 SHGetPathFromIDListW 2108->2118 2109->2107 2115 41037f-410384 2109->2115 2117->2109 2119 410351-41035d 2118->2119 2120 410333-41034a call 412fba 2118->2120 2119->2117 2120->2119
                                              APIs
                                              • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                              • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                              • _wcsncpy.LIBCMT ref: 004102ED
                                              • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                              • _wcsncpy.LIBCMT ref: 00410340
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                              • String ID: C:\Users\user\Desktop\shipping documents.exe
                                              • API String ID: 3170942423-2763546113
                                              • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                              • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                              • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                              • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2123 401250-40125c 2124 401262-401293 call 412f40 call 401b80 2123->2124 2125 4012e8-4012ed 2123->2125 2130 4012d1-4012e2 KillTimer SetTimer 2124->2130 2131 401295-4012b5 2124->2131 2130->2125 2132 4012bb-4012bf 2131->2132 2133 4272ec-4272f2 2131->2133 2134 4012c5-4012cb 2132->2134 2135 42733f-427346 2132->2135 2136 4272f4-427315 Shell_NotifyIconW 2133->2136 2137 42731a-42733a Shell_NotifyIconW 2133->2137 2134->2130 2138 427393-4273b4 Shell_NotifyIconW 2134->2138 2139 427348-427369 Shell_NotifyIconW 2135->2139 2140 42736e-42738e Shell_NotifyIconW 2135->2140 2136->2130 2137->2130 2138->2130 2139->2130 2140->2130
                                              APIs
                                                • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                              • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                              • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                              • String ID:
                                              • API String ID: 3300667738-0
                                              • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                              • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                              • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                              • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2141 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2144 427190-4271ae RegQueryValueExW 2141->2144 2145 40e4eb-40e4f0 2141->2145 2146 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2144->2146 2147 42721a-42722a RegCloseKey 2144->2147 2152 427210-427219 call 436508 2146->2152 2153 4271f7-42720e call 402160 2146->2153 2152->2147 2153->2152
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                              • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: QueryValue$CloseOpen
                                              • String ID: Include$Software\AutoIt v3\AutoIt
                                              • API String ID: 1586453840-614718249
                                              • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                              • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                              • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                              • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2158 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                                              APIs
                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                              • ShowWindow.USER32(?,00000000), ref: 004105E4
                                              • ShowWindow.USER32(?,00000000), ref: 004105EE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$CreateShow
                                              • String ID: AutoIt v3$edit
                                              • API String ID: 1584632944-3779509399
                                              • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                              • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                              • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                              • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                              APIs
                                              • _malloc.LIBCMT ref: 004115F1
                                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 00413600
                                              • std::exception::exception.LIBCMT ref: 00411626
                                              • std::exception::exception.LIBCMT ref: 00411640
                                              • __CxxThrowException@8.LIBCMT ref: 00411651
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                              • String ID: @fI$bad allocation
                                              • API String ID: 615853336-1412114257
                                              • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                              • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                              • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                              • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D
                                              APIs
                                                • Part of subcall function 03EC9378: Sleep.KERNELBASE(000001F4), ref: 03EC9389
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03EC95F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1724029933.0000000003EC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 03EC7000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3ec7000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateFileSleep
                                              • String ID: 3LXG9W79QPOTOAS4TIL4JQ75H91
                                              • API String ID: 2694422964-997645785
                                              • Opcode ID: 9f081aa52032c2a3e020349044aaf126d7a583459f328c99d9fdc883a9314cde
                                              • Instruction ID: 635506f8a3c23f0f0b18eeb8ec205b1469855deca93144160b863e1c3484b485
                                              • Opcode Fuzzy Hash: 9f081aa52032c2a3e020349044aaf126d7a583459f328c99d9fdc883a9314cde
                                              • Instruction Fuzzy Hash: 5D619330D1428CDAEF11DBA4C944BEEBB79AF15304F04419DE6487B2C1D7BA4B49CB66
                                              APIs
                                              • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              • _wcsncpy.LIBCMT ref: 00401C41
                                              • _wcscpy.LIBCMT ref: 00401C5D
                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                              • String ID: Line:
                                              • API String ID: 1874344091-1585850449
                                              • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                              • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                              • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                              • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                              • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                              • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                              • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Close$OpenQueryValue
                                              • String ID: Control Panel\Mouse
                                              • API String ID: 1607946009-824357125
                                              • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                              • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                              • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                              • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                              APIs
                                                • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                              • _free.LIBCMT ref: 004295A0
                                                • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                              • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\shipping documents.exe$p@
                                              • API String ID: 3938964917-1782140409
                                              • Opcode ID: 04a933f2bae5c84e1ec678a83764c5dff2752dbbd219a3b8ffd94249686463e6
                                              • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                              • Opcode Fuzzy Hash: 04a933f2bae5c84e1ec678a83764c5dff2752dbbd219a3b8ffd94249686463e6
                                              • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 03EC8BA5
                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03EC8BC9
                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03EC8BEB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1724029933.0000000003EC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 03EC7000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3ec7000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                              • String ID:
                                              • API String ID: 2438371351-0
                                              • Opcode ID: 932a8f43b2c324a6e880b45aa11ae59a53f266e36399e6caa3e7e9a692624255
                                              • Instruction ID: f8c6a11328e6e3a99dd8b785a246a8e2709a43c8a022eabbaf3d26365676bb52
                                              • Opcode Fuzzy Hash: 932a8f43b2c324a6e880b45aa11ae59a53f266e36399e6caa3e7e9a692624255
                                              • Instruction Fuzzy Hash: 8A62E934A242589BEB24CFA4C950BDEB376EF58304F1091A9D10DEB390E7759E81CB5A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: Error:
                                              • API String ID: 4104443479-232661952
                                              • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                              • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                              • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                              • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                              APIs
                                              • _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • _memmove.LIBCMT ref: 00401B57
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                              • String ID: @EXITCODE
                                              • API String ID: 2734553683-3436989551
                                              • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                              • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                              • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                              • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                              Strings
                                              • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                              • C:\Users\user\Desktop\shipping documents.exe, xrefs: 00410107
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _strcat
                                              • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\shipping documents.exe
                                              • API String ID: 1765576173-3551121370
                                              • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                              • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                              • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                              • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                              • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                              • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                              • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                              • String ID:
                                              • API String ID: 1794320848-0
                                              • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                              • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                              • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                              • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                              • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Process$CurrentTerminate
                                              • String ID:
                                              • API String ID: 2429186680-0
                                              • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                              • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                              • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                              • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                              APIs
                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: IconNotifyShell_
                                              • String ID:
                                              • API String ID: 1144537725-0
                                              • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                              • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                              • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                              • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                              APIs
                                              • _malloc.LIBCMT ref: 0043214B
                                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 00413600
                                              • _malloc.LIBCMT ref: 0043215D
                                              • _malloc.LIBCMT ref: 0043216F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _malloc$AllocateHeap
                                              • String ID:
                                              • API String ID: 680241177-0
                                              • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                              • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                              • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                              • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                              APIs
                                              • TranslateMessage.USER32(?), ref: 00409556
                                              • DispatchMessageW.USER32(?), ref: 00409561
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Message$DispatchPeekTranslate
                                              • String ID:
                                              • API String ID: 4217535847-0
                                              • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                              • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                              • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                              • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                              APIs
                                              • _free.LIBCMT ref: 0043210A
                                                • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                                • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                              • _free.LIBCMT ref: 0043211D
                                              • _free.LIBCMT ref: 00432130
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _free$ErrorFreeHeapLast
                                              • String ID:
                                              • API String ID: 776569668-0
                                              • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                              • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                              • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                              • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                                              • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                              • Opcode Fuzzy Hash: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                                              • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                              APIs
                                              • __wsplitpath.LIBCMT ref: 004678F7
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorLast__wsplitpath_malloc
                                              • String ID:
                                              • API String ID: 4163294574-0
                                              • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                              • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                              • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                              • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                              APIs
                                                • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                              • _strcat.LIBCMT ref: 0040F786
                                                • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                              • String ID:
                                              • API String ID: 3199840319-0
                                              • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                              • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                              • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                              • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                              APIs
                                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                              • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: FreeInfoLibraryParametersSystem
                                              • String ID:
                                              • API String ID: 3403648963-0
                                              • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                              • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                              • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                              • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                              APIs
                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID:
                                              • API String ID: 823142352-0
                                              • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                              • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                              • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                              • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                              APIs
                                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                              • __lock_file.LIBCMT ref: 00414A8D
                                                • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                              • __fclose_nolock.LIBCMT ref: 00414A98
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                              • String ID:
                                              • API String ID: 2800547568-0
                                              • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                              • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                              • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                              • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                              APIs
                                              • __lock_file.LIBCMT ref: 00415012
                                              • __ftell_nolock.LIBCMT ref: 0041501F
                                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __ftell_nolock__getptd_noexit__lock_file
                                              • String ID:
                                              • API String ID: 2999321469-0
                                              • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                              • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                              • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                              • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 03EC8BA5
                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03EC8BC9
                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03EC8BEB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1724029933.0000000003EC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 03EC7000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3ec7000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                              • String ID:
                                              • API String ID: 2438371351-0
                                              • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                                              • Instruction ID: bb8b8991fc3ef28f6ae08dde8702879e6f1fa2351efa7f55c920a7799e9cceb1
                                              • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                                              • Instruction Fuzzy Hash: 5C12EF24E24658C6EB24DF60D9507DEB232FF68300F1061ED910DEB7A4E77A4E81CB5A
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID:
                                              • API String ID: 4104443479-0
                                              • Opcode ID: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                                              • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                              • Opcode Fuzzy Hash: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                                              • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                              • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                              • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                              • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                                              • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                              • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                              • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                              • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __lock_file
                                              • String ID:
                                              • API String ID: 3031932315-0
                                              • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                              • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                              • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                              • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                              APIs
                                              • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                              • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                              • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                              • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wfsopen
                                              • String ID:
                                              • API String ID: 197181222-0
                                              • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                              • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                              • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                              • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                              APIs
                                              • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                              • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                              • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                              • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 03EC9389
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1724029933.0000000003EC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 03EC7000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3ec7000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction ID: 0638aa87baa94eadf2b398df7396cef8f3fa52e681315ed9368f62cbec653594
                                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                              • Instruction Fuzzy Hash: 4EE09A7494010DAFDB00DFA8D64969D7BB4EF04301F1006A5FD0596680DB319A649A62
                                              APIs
                                              • Sleep.KERNELBASE(000001F4), ref: 03EC9389
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1724029933.0000000003EC7000.00000040.00000020.00020000.00000000.sdmp, Offset: 03EC7000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_3ec7000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction ID: fbb6528457ce60c3a39f1150f738e5e51d2dae9251d26f3b437ed31bf92c6c49
                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                              • Instruction Fuzzy Hash: A5E0BF7494010D9FDB00DFA8D64969D7BB4EF04301F1002A5FD0192280DB3199609A62
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ACOS$ADLIBREGISTER$ADLIBUNREGISTER$ASC$ASCW$ASIN$ASSIGN$ATAN$AUTOITSETOPTION$AUTOITWINGETTITLE$AUTOITWINSETTITLE$BEEP$BINARY$BINARYLEN$BINARYMID$BINARYTOSTRING$BITAND$BITNOT$BITOR$BITROTATE$BITSHIFT$BITXOR$BLOCKINPUT$BREAK$CALL$CDTRAY$CEILING$CHR$CHRW$CLIPGET$CLIPPUT$CONSOLEREAD$CONSOLEWRITE$CONSOLEWRITEERROR$CONTROLCLICK$CONTROLCOMMAND$CONTROLDISABLE$CONTROLENABLE$CONTROLFOCUS$CONTROLGETFOCUS$CONTROLGETHANDLE$CONTROLGETPOS$CONTROLGETTEXT$CONTROLHIDE$CONTROLLISTVIEW$CONTROLMOVE$CONTROLSEND$CONTROLSETTEXT$CONTROLSHOW$CONTROLTREEVIEW$COS$DEC$DIRCOPY$DIRCREATE$DIRGETSIZE$DIRMOVE$DIRREMOVE$DLLCALL$DLLCALLADDRESS$DLLCALLBACKFREE$DLLCALLBACKGETPTR$DLLCALLBACKREGISTER$DLLCLOSE$DLLOPEN$DLLSTRUCTCREATE$DLLSTRUCTGETDATA$DLLSTRUCTGETPTR$DLLSTRUCTGETSIZE$DLLSTRUCTSETDATA$DRIVEGETDRIVE$DRIVEGETFILESYSTEM$DRIVEGETLABEL$DRIVEGETSERIAL$DRIVEGETTYPE$DRIVEMAPADD$DRIVEMAPDEL$DRIVEMAPGET$DRIVESETLABEL$DRIVESPACEFREE$DRIVESPACETOTAL$DRIVESTATUS$DUMMYSPEEDTEST$ENVGET$ENVSET$ENVUPDATE$EVAL$EXECUTE$EXP$FILECHANGEDIR$FILECLOSE$FILECOPY$FILECREATENTFSLINK$FILECREATESHORTCUT$FILEDELETE$FILEEXISTS$FILEFINDFIRSTFILE$FILEFINDNEXTFILE$FILEFLUSH$FILEGETATTRIB$FILEGETENCODING$FILEGETLONGNAME$FILEGETPOS$FILEGETSHORTCUT$FILEGETSHORTNAME$FILEGETSIZE$FILEGETTIME$FILEGETVERSION$FILEINSTALL$FILEMOVE$FILEOPEN$FILEOPENDIALOG$FILEREAD$FILEREADLINE$FILERECYCLE$FILERECYCLEEMPTY$FILESAVEDIALOG$FILESELECTFOLDER$FILESETATTRIB$FILESETPOS$FILESETTIME$FILEWRITE$FILEWRITELINE$FLOOR$FTPSETPROXY$GUICREATE$GUICTRLCREATEAVI$GUICTRLCREATEBUTTON$GUICTRLCREATECHECKBOX$GUICTRLCREATECOMBO$GUICTRLCREATECONTEXTMENU$GUICTRLCREATEDATE$GUICTRLCREATEDUMMY$GUICTRLCREATEEDIT$GUICTRLCREATEGRAPHIC$GUICTRLCREATEGROUP$GUICTRLCREATEICON$GUICTRLCREATEINPUT$GUICTRLCREATELABEL$GUICTRLCREATELIST$GUICTRLCREATELISTVIEW$GUICTRLCREATELISTVIEWITEM$GUICTRLCREATEMENU$GUICTRLCREATEMENUITEM$GUICTRLCREATEMONTHCAL$GUICTRLCREATEOBJ$GUICTRLCREATEPIC$GUICTRLCREATEPROGRESS$GUICTRLCREATERADIO$GUICTRLCREATESLIDER$GUICTRLCREATETAB$GUICTRLCREATETABITEM$GUICTRLCREATETREEVIEW$GUICTRLCREATETREEVIEWITEM$GUICTRLCREATEUPDOWN$GUICTRLDELETE$GUICTRLGETHANDLE$GUICTRLGETSTATE$GUICTRLREAD$GUICTRLRECVMSG$GUICTRLREGISTERLISTVIEWSORT$GUICTRLSENDMSG$GUICTRLSENDTODUMMY$GUICTRLSETBKCOLOR$GUICTRLSETCOLOR$GUICTRLSETCURSOR$GUICTRLSETDATA$GUICTRLSETDEFBKCOLOR$GUICTRLSETDEFCOLOR$GUICTRLSETFONT$GUICTRLSETGRAPHIC$GUICTRLSETIMAGE$GUICTRLSETLIMIT$GUICTRLSETONEVENT$GUICTRLSETPOS$GUICTRLSETRESIZING$GUICTRLSETSTATE$GUICTRLSETSTYLE$GUICTRLSETTIP$GUIDELETE$GUIGETCURSORINFO$GUIGETMSG$GUIGETSTYLE$GUIREGISTERMSG$GUISETACCELERATORS$GUISETBKCOLOR$GUISETCOORD$GUISETCURSOR$GUISETFONT$GUISETHELP$GUISETICON$GUISETONEVENT$GUISETSTATE$GUISETSTYLE$GUISTARTGROUP$GUISWITCH$HEX$HOTKEYSET$HTTPSETPROXY$HTTPSETUSERAGENT$HWND$INETCLOSE$INETGET$INETGETINFO$INETGETSIZE$INETREAD$INIDELETE$INIREAD$INIREADSECTION$INIREADSECTIONNAMES$INIRENAMESECTION$INIWRITE$INIWRITESECTION$INPUTBOX$INT$ISADMIN$ISARRAY$ISBINARY$ISBOOL$ISDECLARED$ISDLLSTRUCT$ISFLOAT$ISHWND$ISINT$ISKEYWORD$ISNUMBER$ISOBJ$ISPTR$ISSTRING$LOG$MEMGETSTATS$MOD$MOUSECLICK$MOUSECLICKDRAG$MOUSEDOWN$MOUSEGETCURSOR$MOUSEGETPOS$MOUSEMOVE$MOUSEUP$MOUSEWHEEL$MSGBOX$NUMBER$OBJCREATE$OBJCREATEINTERFACE$OBJEVENT$OBJGET$OBJNAME$ONAUTOITEXITREGISTER$ONAUTOITEXITUNREGISTER$OPT$PING$PIXELCHECKSUM$PIXELGETCOLOR$PIXELSEARCH$PLUGINCLOSE$PLUGINOPEN$PROCESSCLOSE$PROCESSEXISTS$PROCESSGETSTATS$PROCESSLIST$PROCESSSETPRIORITY$PROCESSWAIT$PROCESSWAITCLOSE$PROGRESSOFF$PROGRESSON$PROGRESSSET$PTR$RANDOM$REGDELETE$REGENUMKEY$REGENUMVAL$REGREAD$REGWRITE$ROUND$RUN$RUNAS$RUNASWAIT$RUNWAIT$SEND$SENDKEEPACTIVE$SETERROR$SETEXTENDED$SHELLEXECUTE$SHELLEXECUTEWAIT$SHUTDOWN$SIN$SLEEP$SOUNDPLAY$SOUNDSETWAVEVOLUME$SPLASHIMAGEON$SPLASHOFF$SPLASHTEXTON$SQRT$SRANDOM$STATUSBARGETTEXT$STDERRREAD$STDINWRITE$STDIOCLOSE$STDOUTREAD$STRING$STRINGADDCR$STRINGCOMPARE$STRINGFORMAT$STRINGFROMASCIIARRAY$STRINGINSTR$STRINGISALNUM$STRINGISALPHA$STRINGISASCII$STRINGISDIGIT$STRINGISFLOAT$STRINGISINT$STRINGISLOWER$STRINGISSPACE$STRINGISUPPER$STRINGISXDIGIT$STRINGLEFT$STRINGLEN$STRINGLOWER$STRINGMID$STRINGREGEXP$STRINGREGEXPREPLACE$STRINGREPLACE$STRINGRIGHT$STRINGSPLIT$STRINGSTRIPCR$STRINGSTRIPWS$STRINGTOASCIIARRAY$STRINGTOBINARY$STRINGTRIMLEFT$STRINGTRIMRIGHT$STRINGUPPER$TAN$TCPACCEPT$TCPCLOSESOCKET$TCPCONNECT$TCPLISTEN$TCPNAMETOIP$TCPRECV$TCPSEND$TCPSHUTDOWN$TCPSTARTUP$TIMERDIFF$TIMERINIT$TOOLTIP$TRAYCREATEITEM$TRAYCREATEMENU$TRAYGETMSG$TRAYITEMDELETE$TRAYITEMGETHANDLE$TRAYITEMGETSTATE$TRAYITEMGETTEXT$TRAYITEMSETONEVENT$TRAYITEMSETSTATE$TRAYITEMSETTEXT$TRAYSETCLICK$TRAYSETICON$TRAYSETONEVENT$TRAYSETPAUSEICON$TRAYSETSTATE$TRAYSETTOOLTIP$TRAYTIP$UBOUND$UDPBIND$UDPCLOSESOCKET$UDPOPEN$UDPRECV$UDPSEND$UDPSHUTDOWN$UDPSTARTUP$VARGETTYPE$WINACTIVATE$WINACTIVE$WINCLOSE$WINEXISTS$WINFLASH$WINGETCARETPOS$WINGETCLASSLIST$WINGETCLIENTSIZE$WINGETHANDLE$WINGETPOS$WINGETPROCESS$WINGETSTATE$WINGETTEXT$WINGETTITLE$WINKILL$WINLIST$WINMENUSELECTITEM$WINMINIMIZEALL$WINMINIMIZEALLUNDO$WINMOVE$WINSETONTOP$WINSETSTATE$WINSETTITLE$WINSETTRANS$WINWAIT$WINWAITACTIVE$WINWAITCLOSE$WINWAITNOTACTIVE
                                              • API String ID: 0-3585074353
                                              • Opcode ID: ba8a56c525f2ab8083ea47a4205d384288cf74699609c79749677c285f6d3d1a
                                              • Instruction ID: 0798a96d1735c769271719102aed4892e2a5b1ccb222a8b1094b1c2d17c0247c
                                              • Opcode Fuzzy Hash: ba8a56c525f2ab8083ea47a4205d384288cf74699609c79749677c285f6d3d1a
                                              • Instruction Fuzzy Hash: 318357F1905B409FD351DF9AE989605BAE1F3AA3197A2853FC5088B731D3B8194ACF4C
                                              APIs
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                              • NtdllDialogWndProc_W.NTDLL(?,0000004E,?,?), ref: 0047C8FC
                                              • GetKeyState.USER32(00000011), ref: 0047C92D
                                              • GetKeyState.USER32(00000009), ref: 0047C936
                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                              • GetKeyState.USER32(00000010), ref: 0047C953
                                              • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                              • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                              • _wcsncpy.LIBCMT ref: 0047CA29
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                              • SendMessageW.USER32 ref: 0047CA7F
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                              • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                              • SetCapture.USER32(?), ref: 0047CBB6
                                              • ClientToScreen.USER32(?,?), ref: 0047CC17
                                              • ReleaseCapture.USER32 ref: 0047CC3A
                                              • GetCursorPos.USER32(?), ref: 0047CC72
                                              • ScreenToClient.USER32(?,?), ref: 0047CC80
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                              • SendMessageW.USER32 ref: 0047CD12
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                              • SendMessageW.USER32 ref: 0047CD80
                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                              • GetCursorPos.USER32(?), ref: 0047CDC8
                                              • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                              • GetParent.USER32(00000000), ref: 0047CDF7
                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                              • SendMessageW.USER32 ref: 0047CE93
                                              • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,02EE1B30,00000000,?,?,?,?), ref: 0047CF1C
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                              • SendMessageW.USER32 ref: 0047CF6B
                                              • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,02EE1B30,00000000,?,?,?,?), ref: 0047CFE6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$ClientScreen$State$CaptureCursorMenuPopupTrack$DialogInvalidateNtdllParentProc_RectRelease_wcsncpy
                                              • String ID: @GUI_DRAGID$F
                                              • API String ID: 2835958686-4164748364
                                              • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                              • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                              • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                              • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                              APIs
                                              • GetForegroundWindow.USER32 ref: 00434420
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                              • IsIconic.USER32(?), ref: 0043444F
                                              • ShowWindow.USER32(?,00000009), ref: 0043445C
                                              • SetForegroundWindow.USER32(?), ref: 0043446A
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                              • GetCurrentThreadId.KERNEL32 ref: 00434485
                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                              • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                              • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                              • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                              • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                              • keybd_event.USER32(00000012,00000000), ref: 00434514
                                              • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                              • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 2889586943-2988720461
                                              • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                              • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                              • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                              • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                              APIs
                                              • GetLocalTime.KERNEL32(?), ref: 004722A2
                                              • __swprintf.LIBCMT ref: 004722B9
                                              • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,OMMONDIR), ref: 004724EC
                                              • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,OMMONDIR), ref: 00472506
                                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,OMMONDIR), ref: 00472520
                                              • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,OMMONDIR), ref: 0047253A
                                              • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,OMMONDIR), ref: 00472554
                                              • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,OMMONDIR), ref: 0047256E
                                              • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,OMMONDIR), ref: 00472588
                                              • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,OMMONDIR), ref: 004725A2
                                              • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,OMMONDIR), ref: 004725BC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: FolderPath$LocalTime__swprintf
                                              • String ID: %.3d$ADD$ERNAME$OGRAMSDIR$STARTUPDIR$TMENUDIR$TOPDIR$TUPCOMMONDIR$VORITESDIR
                                              • API String ID: 3337348382-870383330
                                              • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                              • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                              • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                              • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                              APIs
                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                              • CloseHandle.KERNEL32(?), ref: 004463A0
                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                              • GetProcessWindowStation.USER32 ref: 004463D1
                                              • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                              • _wcslen.LIBCMT ref: 00446498
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • _wcsncpy.LIBCMT ref: 004464C0
                                              • 74AF5590.USERENV(?,00000020), ref: 004464D9
                                              • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                              • CloseWindowStation.USER32(00000000), ref: 0044656C
                                              • CloseDesktop.USER32(?), ref: 0044657A
                                              • SetProcessWindowStation.USER32(?), ref: 00446588
                                              • CloseHandle.KERNEL32(?), ref: 00446592
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: StationWindow$CloseProcess$DesktopHandleOpen$CreateDuplicateF5590TokenUser_malloc_wcslen_wcsncpy
                                              • String ID: $default$winsta0$winsta0\default
                                              • API String ID: 306896232-1685893292
                                              • Opcode ID: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                                              • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                              • Opcode Fuzzy Hash: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                                              • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                              APIs
                                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                              • FindClose.KERNEL32(00000000), ref: 00478924
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                              • __swprintf.LIBCMT ref: 004789D3
                                              • __swprintf.LIBCMT ref: 00478A1D
                                              • __swprintf.LIBCMT ref: 00478A4B
                                              • __swprintf.LIBCMT ref: 00478A79
                                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                              • __swprintf.LIBCMT ref: 00478AA7
                                              • __swprintf.LIBCMT ref: 00478AD5
                                              • __swprintf.LIBCMT ref: 00478B03
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                              • API String ID: 999945258-2428617273
                                              • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                              • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                              • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                              • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                              APIs
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                              • __wsplitpath.LIBCMT ref: 00403492
                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                              • _wcscpy.LIBCMT ref: 004034A7
                                              • _wcscat.LIBCMT ref: 004034BC
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                              • _wcscpy.LIBCMT ref: 004035A0
                                              • _wcslen.LIBCMT ref: 00403623
                                              • _wcslen.LIBCMT ref: 0040367D
                                              Strings
                                              • _, xrefs: 0040371C
                                              • Error opening the file, xrefs: 00428231
                                              • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                              • Unterminated string, xrefs: 00428348
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                              • API String ID: 3393021363-188983378
                                              • Opcode ID: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                                              • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                              • Opcode Fuzzy Hash: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                                              • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                              APIs
                                              • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                              • GetFocus.USER32 ref: 0046A0DD
                                              • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessagePost$CtrlFocus
                                              • String ID: 0
                                              • API String ID: 1534620443-4108050209
                                              • Opcode ID: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                                              • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                              • Opcode Fuzzy Hash: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                                              • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                              • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                              • FindClose.KERNEL32(00000000), ref: 00431B20
                                              • FindClose.KERNEL32(00000000), ref: 00431B34
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                              • FindClose.KERNEL32(00000000), ref: 00431BCD
                                              • FindClose.KERNEL32(00000000), ref: 00431BDB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                              • String ID: *.*
                                              • API String ID: 1409584000-438819550
                                              • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                              • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                              • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                              • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                              APIs
                                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                              • __swprintf.LIBCMT ref: 00431C2E
                                              • _wcslen.LIBCMT ref: 00431C3A
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                              • String ID: :$\$\??\%s
                                              • API String ID: 2192556992-3457252023
                                              • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                              • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                              • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                              • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                              APIs
                                              • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                              • FindClose.KERNEL32(00000000), ref: 0044291C
                                              • FindClose.KERNEL32(00000000), ref: 00442930
                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                              • FindClose.KERNEL32(00000000), ref: 004429D4
                                                • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                              • FindClose.KERNEL32(00000000), ref: 004429E2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                              • String ID: *.*
                                              • API String ID: 2640511053-438819550
                                              • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                              • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                              • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                              • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                              • GetLastError.KERNEL32 ref: 00433414
                                              • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                              • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                              • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                              • String ID: SeShutdownPrivilege
                                              • API String ID: 2938487562-3733053543
                                              • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                              • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                              • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                              • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                              APIs
                                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                              • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                              • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                              • GetLengthSid.ADVAPI32(?), ref: 00446241
                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                              • CopySid.ADVAPI32(00000000), ref: 00446271
                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                              • String ID:
                                              • API String ID: 1255039815-0
                                              • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                              • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                              • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                              • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                              APIs
                                              • __swprintf.LIBCMT ref: 00433073
                                              • __swprintf.LIBCMT ref: 00433085
                                              • __wcsicoll.LIBCMT ref: 00433092
                                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                              • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                              • LockResource.KERNEL32(00000000), ref: 004330CA
                                              • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                              • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                              • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                              • LockResource.KERNEL32(?), ref: 00433120
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                              • String ID:
                                              • API String ID: 1158019794-0
                                              • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                              • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                              • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                              • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                              • String ID:
                                              • API String ID: 1737998785-0
                                              • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                              • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                              • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                              • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                              • GetLastError.KERNEL32 ref: 0045D6BF
                                              • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Error$Mode$DiskFreeLastSpace
                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                              • API String ID: 4194297153-14809454
                                              • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                              • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                              • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                              • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                              APIs
                                                • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                              • NtdllDialogWndProc_W.NTDLL(?,00000205,?,?), ref: 00471145
                                              • ReleaseCapture.USER32 ref: 0047116F
                                              • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AsyncState$CaptureClientCursorDialogMessageNtdllProc_ReleaseScreenSendTextWindow
                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                              • API String ID: 1737637668-2107944366
                                              • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                              • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                              • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                              • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                              APIs
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 0046530D
                                              • WSAGetLastError.WS2_32(00000000), ref: 0046531C
                                              • bind.WS2_32(00000000,?,00000010), ref: 00465356
                                              • WSAGetLastError.WS2_32(00000000), ref: 00465363
                                              • closesocket.WS2_32(00000000), ref: 00465377
                                              • listen.WS2_32(00000000,00000005), ref: 00465381
                                              • WSAGetLastError.WS2_32(00000000), ref: 004653A9
                                              • closesocket.WS2_32(00000000), ref: 004653BD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorLast$closesocket$bindlistensocket
                                              • String ID:
                                              • API String ID: 540024437-0
                                              • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                              • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                              • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                              • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove$_strncmp
                                              • String ID: \$^$h
                                              • API String ID: 2175499884-3224561352
                                              • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                              • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
                                              • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
                                              • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
                                              APIs
                                              • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                              • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                              • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                              • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                              • NtdllDialogWndProc_W.NTDLL(?,00000005,?,?), ref: 00440817
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$DialogInvalidateMetricsMoveNtdllProc_RectShowSystem
                                              • String ID:
                                              • API String ID: 2044739998-0
                                              • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                              • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                              • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                              • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                              APIs
                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                              • __wsplitpath.LIBCMT ref: 00475644
                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                              • _wcscat.LIBCMT ref: 00475657
                                              • __wcsicoll.LIBCMT ref: 0047567B
                                              • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                              • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                              • String ID:
                                              • API String ID: 2547909840-0
                                              • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                              • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                              • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                              • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                              • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                              • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID: pqI
                                              • API String ID: 2579439406-2459173057
                                              • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                              • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                              • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                              • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ERCP$VUUU$VUUU$VUUU
                                              • API String ID: 0-2165971703
                                              • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                              • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                              • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                              • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                              APIs
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                              • Sleep.KERNEL32(0000000A), ref: 0045250B
                                              • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                              • FindClose.KERNEL32(?), ref: 004525FF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                              • String ID: *.*
                                              • API String ID: 2786137511-438819550
                                              • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                              • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                              • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                              • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                              APIs
                                              • __wcsicoll.LIBCMT ref: 00433349
                                              • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                              • __wcsicoll.LIBCMT ref: 00433375
                                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsicollmouse_event
                                              • String ID: DOWN
                                              • API String ID: 1033544147-711622031
                                              • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                              • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                              • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                              • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 0044C3D2
                                              • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                              • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                              • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: KeyboardMessagePostState$InputSend
                                              • String ID:
                                              • API String ID: 3031425849-0
                                              • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                              • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                              • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                              • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                              APIs
                                                • Part of subcall function 00465225: inet_addr.WS2_32(?), ref: 00465249
                                              • socket.WS2_32(00000002,00000002,00000011), ref: 0047666F
                                              • WSAGetLastError.WS2_32(00000000), ref: 00476692
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorLastinet_addrsocket
                                              • String ID:
                                              • API String ID: 4170576061-0
                                              • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                              • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                              • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                              • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 004478E2
                                              • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                              • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?), ref: 0044791D
                                              • GetCursorPos.USER32(00000000), ref: 0044796A
                                              • TrackPopupMenuEx.USER32(02EE6440,00000000,00000000,?,?,00000000), ref: 00447991
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CursorMenuPopupTrack$DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 192203443-0
                                              • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                              • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                              • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                              • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                              APIs
                                              • GetClientRect.USER32(?,?), ref: 004479CC
                                              • GetCursorPos.USER32(?), ref: 004479D7
                                              • ScreenToClient.USER32(?,?), ref: 004479F3
                                              • WindowFromPoint.USER32(?,?), ref: 00447A34
                                              • NtdllDialogWndProc_W.NTDLL(?,00000020,?,?), ref: 00447AAD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Client$CursorDialogFromNtdllPointProc_RectScreenWindow
                                              • String ID:
                                              • API String ID: 4176674648-0
                                              • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                              • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                              • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                              • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                              APIs
                                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                              • IsWindowVisible.USER32 ref: 0047A368
                                              • IsWindowEnabled.USER32 ref: 0047A378
                                              • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                              • IsIconic.USER32 ref: 0047A393
                                              • IsZoomed.USER32 ref: 0047A3A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                              • String ID:
                                              • API String ID: 292994002-0
                                              • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                              • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                              • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                              • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                              APIs
                                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                              • CoInitialize.OLE32(00000000), ref: 00478442
                                              • CoCreateInstance.COMBASE(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                              • CoUninitialize.COMBASE ref: 0047863C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                              • String ID: .lnk
                                              • API String ID: 886957087-24824748
                                              • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                              • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                              • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                              • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                              APIs
                                              • GetParent.USER32(?), ref: 004503C8
                                              • NtdllDialogWndProc_W.NTDLL(?,00000138,?,?), ref: 00450417
                                              • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?), ref: 00450466
                                              • NtdllDialogWndProc_W.NTDLL(?,00000134,?,?), ref: 00450497
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_$Parent
                                              • String ID:
                                              • API String ID: 3146699748-0
                                              • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                              • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                              • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                              • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                              APIs
                                              • OpenClipboard.USER32(?), ref: 0046DCE7
                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                              • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                              • CloseClipboard.USER32 ref: 0046DD0D
                                              • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                              • CloseClipboard.USER32 ref: 0046DD41
                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                              • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                              • CloseClipboard.USER32 ref: 0046DD99
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                              • String ID:
                                              • API String ID: 15083398-0
                                              • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                              • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                              • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                              • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: U$\
                                              • API String ID: 4104443479-100911408
                                              • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                              • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                              • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                              • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                              APIs
                                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Find$File$CloseFirstNext
                                              • String ID:
                                              • API String ID: 3541575487-0
                                              • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                              • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                              • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                              • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                              APIs
                                              • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                              • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                              • FindClose.KERNEL32(00000000), ref: 004339EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: FileFind$AttributesCloseFirst
                                              • String ID:
                                              • API String ID: 48322524-0
                                              • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                              • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                              • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                              • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                              APIs
                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                              • String ID:
                                              • API String ID: 901099227-0
                                              • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                              • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                              • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                              • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                              APIs
                                              • GetParent.USER32(?), ref: 004503C8
                                              • NtdllDialogWndProc_W.NTDLL(?,00000138,?,?), ref: 00450417
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllParentProc_
                                              • String ID:
                                              • API String ID: 2395719762-0
                                              • Opcode ID: 257248ebf188e141d38afd5c48be2ff607e0986a31bd54eef4ebc635ce2a3468
                                              • Instruction ID: c99212cd859981529d564057689d428d6c5f9a70333a9b0d3c053c51a1006402
                                              • Opcode Fuzzy Hash: 257248ebf188e141d38afd5c48be2ff607e0986a31bd54eef4ebc635ce2a3468
                                              • Instruction Fuzzy Hash: 6911D6351062C0ABD7139B38CC8589B3F68DE43335B18069BF9984F2A3CA344849CB6B
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,00000114,00000000,?), ref: 0046A41E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 3239928679-0
                                              • Opcode ID: 48e87686a5ea7b01e998f9eaac7baca7642045ed066bdf8ff442be2b7787ab7b
                                              • Instruction ID: c63ea47e1094e29e9280ddef29c929305bd4827c6ad27dba34d4d07e9709e350
                                              • Opcode Fuzzy Hash: 48e87686a5ea7b01e998f9eaac7baca7642045ed066bdf8ff442be2b7787ab7b
                                              • Instruction Fuzzy Hash: DF1127322001046BDB10CB04DC849AB7B24EF86324F20811BF60597282CF799C62DBA6
                                              APIs
                                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00447B1B
                                              • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?), ref: 00447B41
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogMessageNtdllProc_Send
                                              • String ID:
                                              • API String ID: 3814093946-0
                                              • Opcode ID: 4cacbd902a3e8074bd40219f09cd08209c02a14dfdcaa0ba7cf7d9d990aaa468
                                              • Instruction ID: c1d44d43ee376328972d656b5f00bca06b75d59f5ecfdf91114eb8bc10ef771e
                                              • Opcode Fuzzy Hash: 4cacbd902a3e8074bd40219f09cd08209c02a14dfdcaa0ba7cf7d9d990aaa468
                                              • Instruction Fuzzy Hash: C611C832200250ABE220DF45EC84FABB769FBD6728F10462FF6404B290C775A846C765
                                              APIs
                                                • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                              • NtdllDialogWndProc_W.NTDLL(?,00000201,?), ref: 00462A03
                                              • NtdllDialogWndProc_W.NTDLL(?,00000204,?,00000000), ref: 00462A24
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AsyncDialogNtdllProc_State$ClientCursorScreen
                                              • String ID:
                                              • API String ID: 2121657457-0
                                              • Opcode ID: 3aa67e009f936217d0391dd0aa5e8dd8940afc03e729d5e986ef420fd54892e7
                                              • Instruction ID: 08c67b91cd2399f8ba12915c6cae0ffbb32616dfeb2567f7c91428428e8fa67e
                                              • Opcode Fuzzy Hash: 3aa67e009f936217d0391dd0aa5e8dd8940afc03e729d5e986ef420fd54892e7
                                              • Instruction Fuzzy Hash: 76018172240124BBE7049F86EC99DFFB76CEB85762F10402BFA4197192C6B59811CBB5
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,?,?,?), ref: 0047EA9E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 3239928679-0
                                              • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                              • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                              • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                              • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,00000006,?,?), ref: 004404DC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 3239928679-0
                                              • Opcode ID: 2b72283bca5b9e831272dd2a7d53a0b5c7148644ca1e9fa5d4a4720e5b910540
                                              • Instruction ID: 57bcafdb766b4b2a09d5adb44fbeadd94fd8413be8ed8c1894e52dfe49116fd8
                                              • Opcode Fuzzy Hash: 2b72283bca5b9e831272dd2a7d53a0b5c7148644ca1e9fa5d4a4720e5b910540
                                              • Instruction Fuzzy Hash: 1EF0B471500254ABE7148F05DC40A7B7B79EB86720F20461EFA144B280CB75AC62CBF4
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?), ref: 004403A3
                                                • Part of subcall function 00430B0F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004A9568,004A9554), ref: 00430B6C
                                                • Part of subcall function 00430B0F: CloseHandle.KERNEL32(00000000), ref: 00430B7D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CloseCreateDialogHandleNtdllProc_Process
                                              • String ID:
                                              • API String ID: 4178364262-0
                                              • Opcode ID: 18637488ffc27074e36ea774df1fe185273bfafa6678f284e57b2aa28cd93e6f
                                              • Instruction ID: b7a625ee7c2def1aa5d9f3d540ff339fd2ef2d8d1ff8bada222fa30ad2921ed2
                                              • Opcode Fuzzy Hash: 18637488ffc27074e36ea774df1fe185273bfafa6678f284e57b2aa28cd93e6f
                                              • Instruction Fuzzy Hash: B9F06D76240218ABDB00EF88EC50D9B73ADEF8D355B00881AFE449B341CB74BD60CBA4
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 00454D3F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 3239928679-0
                                              • Opcode ID: 8b2826b66b2b31c60da67efd8c1127cd395e8061a58d0ebf04d064e84851811b
                                              • Instruction ID: 9a3c2df9a808ce5be259132a16ac8c8eacf78c0d12b80627a94478e4176c466c
                                              • Opcode Fuzzy Hash: 8b2826b66b2b31c60da67efd8c1127cd395e8061a58d0ebf04d064e84851811b
                                              • Instruction Fuzzy Hash: DCF08C70244208BBE310DE48CC45F9B7BA8EB4A715F508109F958572D2CAB07844CBA5
                                              APIs
                                                • Part of subcall function 00430CCB: FreeLibrary.KERNEL32(?), ref: 00430CD8
                                              • NtdllDialogWndProc_W.NTDLL(?,0000031A,?,?), ref: 0044789F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogFreeLibraryNtdllProc_
                                              • String ID:
                                              • API String ID: 4233852882-0
                                              • Opcode ID: 2bb9f87cd0a41e8130f62da48c4106c6c5914e99f78363fa9e43659e77d0986b
                                              • Instruction ID: fc5b3b6852e979a31c658b193d70e7a126e9e4bfaffbe52d983344414c160798
                                              • Opcode Fuzzy Hash: 2bb9f87cd0a41e8130f62da48c4106c6c5914e99f78363fa9e43659e77d0986b
                                              • Instruction Fuzzy Hash: 79E0EDB5D15218BBDB00EFB5DC498EEB7ACEB88301B00896AFC1193241D6749A118FA5
                                              APIs
                                              • BlockInput.USER32(00000001), ref: 0045A38B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: BlockInput
                                              • String ID:
                                              • API String ID: 3456056419-0
                                              • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                              • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                              • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                              • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000), ref: 00447B7E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 3239928679-0
                                              • Opcode ID: 8e6373e291cc12f70f08d4f4410b7c8524115a22fdba9030887a55257885973c
                                              • Instruction ID: 312b02e0ec000ae8217ec3e2a2b597e760e3ea2cc33aa0823c57154ec146f294
                                              • Opcode Fuzzy Hash: 8e6373e291cc12f70f08d4f4410b7c8524115a22fdba9030887a55257885973c
                                              • Instruction Fuzzy Hash: F0E08635640114BFD600EF85DC51FEB772CEF8A754F20800AFA044B291CA75F802CBA9
                                              APIs
                                              • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: LogonUser
                                              • String ID:
                                              • API String ID: 1244722697-0
                                              • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                              • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                              • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                              • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,00000212), ref: 0044032E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 3239928679-0
                                              • Opcode ID: c8074131f37bb21e52515d0e719f0e6372a069fb1b0bf1c5daab0305562a1656
                                              • Instruction ID: cdfa3c7c0e358d42617837c3919da1626915cb286f17707c0539985eb8f146ed
                                              • Opcode Fuzzy Hash: c8074131f37bb21e52515d0e719f0e6372a069fb1b0bf1c5daab0305562a1656
                                              • Instruction Fuzzy Hash: DFE0B675240248AFD700DF48D898D9A77A9EB89700F048458FA554B3A2C6B0B810CB61
                                              APIs
                                                • Part of subcall function 00470928: DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                              • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000), ref: 0047134E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AcceleratorDestroyDialogNtdllProc_Table
                                              • String ID:
                                              • API String ID: 2638641937-0
                                              • Opcode ID: 1fe523bc3ffe7451472abd685aad30700db2524a9dbb340e0d67ef59a1e13db2
                                              • Instruction ID: 049d54cb1fe6716e8d8a3831c4e241097285c9e82ec9b29a3d6a302b973cbdb4
                                              • Opcode Fuzzy Hash: 1fe523bc3ffe7451472abd685aad30700db2524a9dbb340e0d67ef59a1e13db2
                                              • Instruction Fuzzy Hash: 33D012B26C2324B6E51036965D1BFCFFA5CCF1ABA1F108017F704B60C289E9640086FD
                                              APIs
                                              • NtdllDialogWndProc_W.NTDLL(?,00000211), ref: 00440360
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DialogNtdllProc_
                                              • String ID:
                                              • API String ID: 3239928679-0
                                              • Opcode ID: 5f87cae89cac6f8e2d25e27d115a3a7f1dea2ab8eb24d34981d9022fbff52b9c
                                              • Instruction ID: 3c6c68f393c460ac128c5d0723b5b392c07b23a02b9a2d0c15d00fa147821f68
                                              • Opcode Fuzzy Hash: 5f87cae89cac6f8e2d25e27d115a3a7f1dea2ab8eb24d34981d9022fbff52b9c
                                              • Instruction Fuzzy Hash: A4E0EC75240248AFDB00DF48D898E9B77A9FB89700F048458FA554B3A2C7B0F810CFA1
                                              APIs
                                              • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: NameUser
                                              • String ID:
                                              • API String ID: 2645101109-0
                                              • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                              • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                              • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                              • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                              • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                              • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                              • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: N@
                                              • API String ID: 0-1509896676
                                              • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                              • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                              • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                              • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                              • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                              • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                              • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                              • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                              • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                              • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                              • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                              • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                              • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                              • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                              • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                              • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                              APIs
                                              • DeleteObject.GDI32(?), ref: 0045953B
                                              • DeleteObject.GDI32(?), ref: 00459551
                                              • GetDesktopWindow.USER32 ref: 00459581
                                              • GetWindowRect.USER32(00000000), ref: 00459588
                                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                              • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                              • GetClientRect.USER32(00000000,?), ref: 004596F8
                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                              • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                              • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                              • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                              • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,000001F4), ref: 004597B9
                                              • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                              • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                              • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                              • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                              • ShowWindow.USER32(?,00000004), ref: 00459865
                                              • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                              • GetStockObject.GDI32(00000011), ref: 004598CD
                                              • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                              • DeleteDC.GDI32(00000000), ref: 004598F8
                                              • _wcslen.LIBCMT ref: 00459916
                                              • _wcscpy.LIBCMT ref: 0045993A
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                              • 73A1A570.USER32(00000000,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599FC
                                              • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                              • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                              • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$CreateObject$Global$Rect$DeleteFileSelect$MessageSendShow$A570AdjustAllocClientCloseCopyDesktopFaceFontFreeHandleImageLoadLockMovePictureReadSizeStockStreamTextUnlock_wcscpy_wcslen
                                              • String ID: $AutoIt v3$DISPLAY$static
                                              • API String ID: 3462561085-2373415609
                                              • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                              • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                              • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                              • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                              APIs
                                              • GetSysColor.USER32(00000012), ref: 0044181E
                                              • SetTextColor.GDI32(?,?), ref: 00441826
                                              • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                              • GetSysColor.USER32(0000000F), ref: 00441849
                                              • SetBkColor.GDI32(?,?), ref: 00441864
                                              • SelectObject.GDI32(?,?), ref: 00441874
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                              • GetSysColor.USER32(00000010), ref: 004418B2
                                              • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                              • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                              • DeleteObject.GDI32(?), ref: 004418D5
                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                              • FillRect.USER32(?,?,?), ref: 00441970
                                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameMessageRoundSendSolid
                                              • String ID:
                                              • API String ID: 3518701105-0
                                              • Opcode ID: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                                              • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                              • Opcode Fuzzy Hash: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                                              • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                              • API String ID: 1038674560-3360698832
                                              • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                              • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                              • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                              • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                              APIs
                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                              • SetCursor.USER32(00000000), ref: 0043075B
                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                              • SetCursor.USER32(00000000), ref: 00430773
                                              • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                              • SetCursor.USER32(00000000), ref: 0043078B
                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                              • SetCursor.USER32(00000000), ref: 004307A3
                                              • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                              • SetCursor.USER32(00000000), ref: 004307BB
                                              • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                              • SetCursor.USER32(00000000), ref: 004307D3
                                              • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                              • SetCursor.USER32(00000000), ref: 004307EB
                                              • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                              • SetCursor.USER32(00000000), ref: 00430803
                                              • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                              • SetCursor.USER32(00000000), ref: 0043081B
                                              • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                              • SetCursor.USER32(00000000), ref: 00430833
                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                              • SetCursor.USER32(00000000), ref: 0043084B
                                              • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                              • SetCursor.USER32(00000000), ref: 00430863
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                              • SetCursor.USER32(00000000), ref: 0043087B
                                              • SetCursor.USER32(00000000), ref: 00430887
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                              • SetCursor.USER32(00000000), ref: 0043089F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Cursor$Load
                                              • String ID:
                                              • API String ID: 1675784387-0
                                              • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                              • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                              • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                              • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                              APIs
                                              • GetSysColor.USER32(0000000E), ref: 00430913
                                              • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                              • GetSysColor.USER32(00000012), ref: 00430933
                                              • SetTextColor.GDI32(?,?), ref: 0043093B
                                              • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                              • GetSysColor.USER32(0000000F), ref: 00430959
                                              • CreateSolidBrush.GDI32(?), ref: 00430962
                                              • GetSysColor.USER32(00000011), ref: 00430979
                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                              • SelectObject.GDI32(?,00000000), ref: 0043099C
                                              • SetBkColor.GDI32(?,?), ref: 004309A6
                                              • SelectObject.GDI32(?,?), ref: 004309B4
                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                              • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                              • DrawFocusRect.USER32(?,?), ref: 00430A91
                                              • GetSysColor.USER32(00000011), ref: 00430A9F
                                              • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                              • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                              • SelectObject.GDI32(?,?), ref: 00430AD0
                                              • DeleteObject.GDI32(00000105), ref: 00430ADC
                                              • SelectObject.GDI32(?,?), ref: 00430AE3
                                              • DeleteObject.GDI32(?), ref: 00430AE9
                                              • SetTextColor.GDI32(?,?), ref: 00430AF0
                                              • SetBkColor.GDI32(?,?), ref: 00430AFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflate$FocusMessageRoundSendSolidWindow
                                              • String ID:
                                              • API String ID: 1441705042-0
                                              • Opcode ID: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                                              • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                              • Opcode Fuzzy Hash: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                                              • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                              APIs
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                              • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CloseConnectCreateRegistry
                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                              • API String ID: 3217815495-966354055
                                              • Opcode ID: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                                              • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                              • Opcode Fuzzy Hash: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                                              • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                              APIs
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                              • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                              • GetClientRect.USER32(00000000,?), ref: 0045924E
                                              • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                              • GetStockObject.GDI32(00000011), ref: 004592AC
                                              • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                              • DeleteDC.GDI32(00000000), ref: 004592D6
                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                              • GetStockObject.GDI32(00000011), ref: 004593D3
                                              • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustClientDeleteFaceFontInfoParametersSelectShowSystemText
                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                              • API String ID: 4116885437-517079104
                                              • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                              • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                              • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                              • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 004566AE
                                              • GetDesktopWindow.USER32 ref: 004566C3
                                              • GetWindowRect.USER32(00000000), ref: 004566CA
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                              • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                              • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                              • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                              • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                              • IsWindowVisible.USER32(?), ref: 0045682C
                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                              • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                              • GetWindowRect.USER32(?,?), ref: 00456873
                                              • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                              • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                              • CopyRect.USER32(?,?), ref: 004568BE
                                              • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$Rect$Monitor$CopyCreateCursorDesktopFromInfoPointVisible
                                              • String ID: ($,$tooltips_class32
                                              • API String ID: 250492556-3320066284
                                              • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                              • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                              • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                              • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                              APIs
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • GetWindowRect.USER32(?,?), ref: 00471CF7
                                              • GetClientRect.USER32(?,?), ref: 00471D05
                                              • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                              • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                              • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                              • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                              • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                              • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                              • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                              • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                              • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                              • GetClientRect.USER32(?,?), ref: 00471E8A
                                              • GetStockObject.GDI32(00000011), ref: 00471EA6
                                              • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                              • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateMessageObjectSendStockTimer_malloc
                                              • String ID: @$AutoIt v3 GUI
                                              • API String ID: 3078149357-3359773793
                                              • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                              • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                              • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                              • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                              APIs
                                                • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                              • _fseek.LIBCMT ref: 00452B3B
                                              • __wsplitpath.LIBCMT ref: 00452B9B
                                              • _wcscpy.LIBCMT ref: 00452BB0
                                              • _wcscat.LIBCMT ref: 00452BC5
                                              • __wsplitpath.LIBCMT ref: 00452BEF
                                              • _wcscat.LIBCMT ref: 00452C07
                                              • _wcscat.LIBCMT ref: 00452C1C
                                              • __fread_nolock.LIBCMT ref: 00452C53
                                              • __fread_nolock.LIBCMT ref: 00452C64
                                              • __fread_nolock.LIBCMT ref: 00452C83
                                              • __fread_nolock.LIBCMT ref: 00452C94
                                              • __fread_nolock.LIBCMT ref: 00452CB5
                                              • __fread_nolock.LIBCMT ref: 00452CC6
                                              • __fread_nolock.LIBCMT ref: 00452CD7
                                              • __fread_nolock.LIBCMT ref: 00452CE8
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                              • __fread_nolock.LIBCMT ref: 00452D78
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                              • String ID:
                                              • API String ID: 2054058615-0
                                              • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                              • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                              • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                              • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsicoll$__wcsnicmp
                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                              • API String ID: 790654849-1810252412
                                              • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                              • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                              • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                              • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                                              • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                              • Opcode Fuzzy Hash: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                                              • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window
                                              • String ID: 0
                                              • API String ID: 2353593579-4108050209
                                              • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                              • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                              • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                              • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                              APIs
                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                              • __mtterm.LIBCMT ref: 00417C34
                                                • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                • Part of subcall function 004178FF: RtlDeleteCriticalSection.NTDLL(00000000), ref: 004181B8
                                                • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                • Part of subcall function 004178FF: RtlDeleteCriticalSection.NTDLL(00000017), ref: 004181E2
                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                              • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                              • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                              • __init_pointers.LIBCMT ref: 00417CE6
                                              • __calloc_crt.LIBCMT ref: 00417D54
                                              • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                              • API String ID: 4163708885-3819984048
                                              • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                              • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                              • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                              • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsicoll$IconLoad
                                              • String ID: blank$info$question$stop$warning
                                              • API String ID: 2485277191-404129466
                                              • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                              • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                              • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                              • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                              APIs
                                              • LoadIconW.USER32(?,00000063), ref: 0045464C
                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                              • SetWindowTextW.USER32(?,?), ref: 00454678
                                              • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                              • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                              • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                              • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                              • GetWindowRect.USER32(?,?), ref: 004546F5
                                              • SetWindowTextW.USER32(?,?), ref: 00454765
                                              • GetDesktopWindow.USER32 ref: 0045476F
                                              • GetWindowRect.USER32(00000000), ref: 00454776
                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                              • GetClientRect.USER32(?,?), ref: 004547D2
                                              • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                              • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                              • String ID:
                                              • API String ID: 3869813825-0
                                              • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                              • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                              • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                              • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                              APIs
                                              • _wcslen.LIBCMT ref: 00464B28
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                              • _wcslen.LIBCMT ref: 00464C28
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                              • _wcslen.LIBCMT ref: 00464CBA
                                              • _wcslen.LIBCMT ref: 00464CD0
                                              • _wcslen.LIBCMT ref: 00464CEF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$Directory$CurrentSystem
                                              • String ID: D
                                              • API String ID: 1914653954-2746444292
                                              • Opcode ID: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                                              • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                              • Opcode Fuzzy Hash: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                                              • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsicoll
                                              • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                              • API String ID: 3832890014-4202584635
                                              • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                              • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                              • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                              • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                              APIs
                                              • GetSysColor.USER32(0000000F), ref: 0044A05E
                                              • GetClientRect.USER32(?,?), ref: 0044A0D1
                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                              • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                              • GetSysColor.USER32(0000000F), ref: 0044A131
                                              • GetSysColor.USER32(0000000F), ref: 0044A14F
                                              • GetSysColor.USER32(00000005), ref: 0044A15B
                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                              • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                              • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                              • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                              • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                              • GetSysColor.USER32(00000008), ref: 0044A265
                                              • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                              • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                              • GetStockObject.GDI32(00000005), ref: 0044A28A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Color$Pixel$ClientMessageModeObjectRectSendStockText
                                              • String ID:
                                              • API String ID: 4000845554-0
                                              • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                              • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                              • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                              • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                              • GetMenuItemCount.USER32(?), ref: 00468C45
                                              • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                              • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                              • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                              • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                              • GetMenuItemCount.USER32 ref: 00468CFD
                                              • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                              • GetCursorPos.USER32(?), ref: 00468D3F
                                              • SetForegroundWindow.USER32(?), ref: 00468D49
                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                              • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                              • String ID: 0
                                              • API String ID: 1441871840-4108050209
                                              • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                              • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                              • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                              • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                              • __swprintf.LIBCMT ref: 00460915
                                              • __swprintf.LIBCMT ref: 0046092D
                                              • _wprintf.LIBCMT ref: 004609E1
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                              • API String ID: 3631882475-2268648507
                                              • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                              • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                              • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                              • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                              • _wcslen.LIBCMT ref: 00461683
                                              • __swprintf.LIBCMT ref: 00461721
                                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                              • GetDlgCtrlID.USER32(?), ref: 00461869
                                              • GetWindowRect.USER32(?,?), ref: 004618A4
                                              • GetParent.USER32(?), ref: 004618C3
                                              • ScreenToClient.USER32(00000000), ref: 004618CA
                                              • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                              • String ID: %s%u
                                              • API String ID: 1899580136-679674701
                                              • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                              • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                              • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                              • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                              APIs
                                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                              • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                              • API String ID: 1976180769-4113822522
                                              • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                              • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                              • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                              • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                              • String ID:
                                              • API String ID: 461458858-0
                                              • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                              • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                              • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                              • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                              APIs
                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                              • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                              • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                              • CloseHandle.KERNEL32(00000000), ref: 00430113
                                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00430120
                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                              • GlobalFree.KERNEL32(00000000), ref: 00430150
                                              • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                              • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                              • DeleteObject.GDI32(?), ref: 004301D0
                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                              • String ID:
                                              • API String ID: 3969911579-0
                                              • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                              • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                              • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                              • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                              • String ID: 0.0.0.0
                                              • API String ID: 1965227024-3771769585
                                              • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                              • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                              • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                              • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                              APIs
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: SendString$_memmove_wcslen
                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                              • API String ID: 369157077-1007645807
                                              • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                              • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                              • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                              • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                              APIs
                                              • GetParent.USER32 ref: 00445BF8
                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                              • __wcsicoll.LIBCMT ref: 00445C33
                                              • __wcsicoll.LIBCMT ref: 00445C4F
                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsicoll$ClassMessageNameParentSend
                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                              • API String ID: 3125838495-3381328864
                                              • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                              • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                              • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                              • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                              APIs
                                              • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                              • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                              • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                              • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                              • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$CharNext
                                              • String ID:
                                              • API String ID: 1350042424-0
                                              • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                              • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                              • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                              • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                              APIs
                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID: ,$tooltips_class32
                                              • API String ID: 716092398-3856767331
                                              • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                              • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                              • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                              • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                              APIs
                                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                              • __swprintf.LIBCMT ref: 0045E7F7
                                              • _wprintf.LIBCMT ref: 0045E8B3
                                              • _wprintf.LIBCMT ref: 0045E8D7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 2295938435-2354261254
                                              • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                              • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                              • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                              • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __swprintf_wcscpy$__i64tow__itow
                                              • String ID: %.15g$0x%p$False$True
                                              • API String ID: 3038501623-2263619337
                                              • Opcode ID: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                                              • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                              • Opcode Fuzzy Hash: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                                              • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                              APIs
                                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                              • __swprintf.LIBCMT ref: 0045E5F6
                                              • _wprintf.LIBCMT ref: 0045E6A3
                                              • _wprintf.LIBCMT ref: 0045E6C7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                              • API String ID: 2295938435-8599901
                                              • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                              • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                              • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                              • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                              APIs
                                              • GetMenuItemInfoW.USER32 ref: 0045522E
                                              • DeleteMenu.USER32(?,?,00000000), ref: 0045529A
                                              • DeleteMenu.USER32(?,?,00000000), ref: 004552B0
                                              • GetMenuItemCount.USER32(?), ref: 004552C1
                                              • SetMenu.USER32(?,00000000), ref: 004552CF
                                              • DestroyMenu.USER32(?,?,00000000), ref: 004552DC
                                              • DrawMenuBar.USER32 ref: 004552EF
                                              • DeleteObject.GDI32(?), ref: 00455736
                                              • DeleteObject.GDI32(?), ref: 00455744
                                              • DestroyCursor.USER32(?), ref: 00455752
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$Delete$DestroyItemObject$CountCursorDrawInfo
                                              • String ID: 0
                                              • API String ID: 3807689593-4108050209
                                              • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                              • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                              • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                              • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                              • LoadStringW.USER32(00000000), ref: 00454040
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • _wprintf.LIBCMT ref: 00454074
                                              • __swprintf.LIBCMT ref: 004540A3
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                              • API String ID: 455036304-4153970271
                                              • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                              • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                              • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                              • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                              APIs
                                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                              • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                              • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                              • _memmove.LIBCMT ref: 00467EB8
                                              • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                              • _memmove.LIBCMT ref: 00467F6C
                                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                              • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                              • String ID:
                                              • API String ID: 2170234536-0
                                              • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                              • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                              • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                              • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 00453CE0
                                              • SetKeyboardState.USER32(?), ref: 00453D3B
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                              • GetKeyState.USER32(000000A0), ref: 00453D75
                                              • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                              • GetKeyState.USER32(000000A1), ref: 00453DB5
                                              • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                              • GetKeyState.USER32(00000011), ref: 00453DEF
                                              • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                              • GetKeyState.USER32(00000012), ref: 00453E26
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                              • GetKeyState.USER32(0000005B), ref: 00453E5D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                              • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                              • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                              • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                              APIs
                                              • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                              • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                              • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                              • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                              • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                              • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                              • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                              • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                              • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                              • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$ItemMoveRect$Invalidate
                                              • String ID:
                                              • API String ID: 3096461208-0
                                              • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                              • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                              • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                              • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                              • String ID:
                                              • API String ID: 136442275-0
                                              • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                              • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                              • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                              • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                              • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
                                              • CLSIDFromString.COMBASE(?,?), ref: 0046CBF1
                                              • CoCreateInstance.COMBASE(?,?,00000005,00482998,?), ref: 0046CC56
                                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                              • _wcslen.LIBCMT ref: 0046CDB0
                                              • CoCreateInstanceEx.COMBASE(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                              • CoTaskMemFree.COMBASE(?), ref: 0046CE42
                                              • CoSetProxyBlanket.COMBASE(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                              Strings
                                              • NULL Pointer assignment, xrefs: 0046CEA6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                              • String ID: NULL Pointer assignment
                                              • API String ID: 440038798-2785691316
                                              • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                              • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                              • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                              • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                              APIs
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                              • _wcslen.LIBCMT ref: 004610A3
                                              • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                              • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                              • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                              • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                              • GetWindowRect.USER32(?,?), ref: 00461248
                                                • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                              • String ID: ThumbnailClass
                                              • API String ID: 4136854206-1241985126
                                              • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                              • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                              • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                              • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                              APIs
                                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                              • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                              • _wcscpy.LIBCMT ref: 004787E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                              • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                              • API String ID: 3052893215-3593318738
                                              • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                              • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                              • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                              • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                              • __swprintf.LIBCMT ref: 00460915
                                              • __swprintf.LIBCMT ref: 0046092D
                                              • _wprintf.LIBCMT ref: 004609E1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                              • API String ID: 3054410614-2561132961
                                              • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                              • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                              • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                              • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                              APIs
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                              • CLSIDFromString.COMBASE(?,?), ref: 004587B3
                                              • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                              • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                              • API String ID: 600699880-22481851
                                              • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                              • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                              • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                              • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                              APIs
                                              • timeGetTime.WINMM ref: 00443B67
                                                • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                              • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                              • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                              • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                              • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                              • IsWindow.USER32(00000000), ref: 00443C3A
                                              • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$Thread$MessageSendSleepTimetime$ActiveAttachCurrentDialogFindInputProcess
                                              • String ID: BUTTON
                                              • API String ID: 2994871518-3405671355
                                              • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                              • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                              • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                              • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                              APIs
                                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                              • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                              • SendMessageW.USER32 ref: 00471740
                                              • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                              • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                              • SendMessageW.USER32 ref: 0047184F
                                              • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                              • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                              • DestroyCursor.USER32(?), ref: 0047189C
                                              • DestroyCursor.USER32(?), ref: 004718A2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$CursorDestroyExtractIcon
                                              • String ID:
                                              • API String ID: 1216984388-0
                                              • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                              • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                              • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                              • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                              APIs
                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                              • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                              • VariantInit.OLEAUT32(?), ref: 004793E1
                                              • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                              • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                              • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                              • VariantClear.OLEAUT32(?), ref: 00479489
                                              • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                              • VariantClear.OLEAUT32(?), ref: 004794CA
                                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                              • String ID:
                                              • API String ID: 2706829360-0
                                              • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                              • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                              • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                              • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                              APIs
                                              • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                              • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                              • DeleteObject.GDI32(?), ref: 0047151E
                                              • DestroyCursor.USER32(?), ref: 0047152C
                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                              • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                              • DestroyCursor.USER32(?), ref: 004715CD
                                              • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                              • DeleteObject.GDI32(?), ref: 004715EA
                                              • DestroyCursor.USER32(?), ref: 004715F8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CursorDestroyMessageSend$DeleteImageLoadObject$ExtractIcon
                                              • String ID:
                                              • API String ID: 424412417-0
                                              • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                              • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                              • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                              • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 0044480E
                                              • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                              • GetKeyState.USER32(000000A0), ref: 004448AA
                                              • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                              • GetKeyState.USER32(000000A1), ref: 004448D9
                                              • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                              • GetKeyState.USER32(00000011), ref: 00444903
                                              • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                              • GetKeyState.USER32(00000012), ref: 0044492D
                                              • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                              • GetKeyState.USER32(0000005B), ref: 00444958
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: State$Async$Keyboard
                                              • String ID:
                                              • API String ID: 541375521-0
                                              • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                              • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                              • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                              • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: InitVariant$_malloc_wcscpy_wcslen
                                              • String ID:
                                              • API String ID: 3413494760-0
                                              • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                              • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                              • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                              • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                              APIs
                                              • _wcsncpy.LIBCMT ref: 00467490
                                              • _wcsncpy.LIBCMT ref: 004674BC
                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                              • _wcstok.LIBCMT ref: 004674FF
                                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                              • _wcstok.LIBCMT ref: 004675B2
                                              • _wcslen.LIBCMT ref: 00467793
                                              • _wcscpy.LIBCMT ref: 00467641
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              • _wcslen.LIBCMT ref: 004677BD
                                              • 7523D1A0.COMDLG32(00000058), ref: 00467807
                                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$_memmove_wcscpy_wcsncpy_wcstok$7523__getptd
                                              • String ID: X
                                              • API String ID: 1386952197-3081909835
                                              • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                              • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                              • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                              • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressProc_free_malloc$_strcat_strlen
                                              • String ID: AU3_FreeVar
                                              • API String ID: 2634073740-771828931
                                              • Opcode ID: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                                              • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                              • Opcode Fuzzy Hash: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                                              • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                              APIs
                                              • CoInitialize.OLE32 ref: 0046C63A
                                              • CoUninitialize.COMBASE ref: 0046C645
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                              • CLSIDFromProgID.COMBASE(00000000,?), ref: 0046C694
                                              • CLSIDFromString.COMBASE(00000000,?), ref: 0046C6A4
                                              • CoCreateInstance.COMBASE(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                              • IIDFromString.COMBASE(?,?), ref: 0046C705
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                              • API String ID: 2294789929-1287834457
                                              • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                              • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                              • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                              • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                              APIs
                                              • 73A1A570.USER32(00000000,?,?), ref: 0043143E
                                              • SelectObject.GDI32(00000000,?), ref: 00431466
                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                              • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: A570BitsObjectSelectStretch
                                              • String ID: (
                                              • API String ID: 4270841370-3887548279
                                              • Opcode ID: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                                              • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                              • Opcode Fuzzy Hash: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                                              • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                              APIs
                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                              • _wcslen.LIBCMT ref: 00450720
                                              • _wcscat.LIBCMT ref: 00450733
                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                              • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window_wcscat_wcslen
                                              • String ID: -----$SysListView32
                                              • API String ID: 4008455318-3975388722
                                              • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                              • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                              • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                              • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                              • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorMode$DriveType
                                              • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown
                                              • API String ID: 2907320926-706929342
                                              • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                              • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                              • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                              • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                              APIs
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                              • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                              • GetParent.USER32 ref: 00469C98
                                              • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                              • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                              • GetParent.USER32 ref: 00469CBC
                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 2360848162-1403004172
                                              • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                              • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                              • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                              • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                              • String ID:
                                              • API String ID: 262282135-0
                                              • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                              • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                              • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                              • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00434643
                                              • GetForegroundWindow.USER32(00000000), ref: 00434655
                                              • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                              • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                              • String ID:
                                              • API String ID: 2156557900-0
                                              • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                              • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                              • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                              • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                              APIs
                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                              • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Interlocked$DecrementIncrement$Sleep
                                              • String ID: @COM_EVENTOBJ$p@
                                              • API String ID: 327565842-3643807195
                                              • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                              • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                              • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                              • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$Copy$ClearErrorInitLast
                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                                              • API String ID: 3207048006-1765764032
                                              • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                              • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                              • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                              • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                              APIs
                                              • CreateMenu.USER32 ref: 00448603
                                              • SetMenu.USER32(?,00000000), ref: 00448613
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                              • IsMenu.USER32(?), ref: 004486AB
                                              • CreatePopupMenu.USER32 ref: 004486B5
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                              • DrawMenuBar.USER32 ref: 004486F5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                              • String ID: 0
                                              • API String ID: 161812096-4108050209
                                              • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                              • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                              • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                              • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\shipping documents.exe), ref: 00434057
                                              • LoadStringW.USER32(00000000), ref: 00434060
                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                              • LoadStringW.USER32(00000000), ref: 00434078
                                              • _wprintf.LIBCMT ref: 004340A1
                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                              Strings
                                              • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                              • C:\Users\user\Desktop\shipping documents.exe, xrefs: 00434040
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: HandleLoadModuleString$Message_wprintf
                                              • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\shipping documents.exe
                                              • API String ID: 3648134473-1497401232
                                              • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                              • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                              • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                              • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                              APIs
                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                              • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                              • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                              • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                              • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                              • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                              • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                              • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                              APIs
                                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\shipping documents.exe,0040F545,C:\Users\user\Desktop\shipping documents.exe,004A90E8,C:\Users\user\Desktop\shipping documents.exe,?,0040F545), ref: 0041013C
                                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                              • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                              • MoveFileW.KERNEL32(?,?), ref: 00453932
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                              • String ID:
                                              • API String ID: 978794511-0
                                              • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                              • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                              • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                              • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                              • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                              • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                              • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ClearVariant
                                              • String ID:
                                              • API String ID: 1473721057-0
                                              • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                              • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                              • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                              • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove$_memcmp
                                              • String ID: '$\$h
                                              • API String ID: 2205784470-1303700344
                                              • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                              • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                              • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                              • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                              APIs
                                              • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                              • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                              • VariantClear.OLEAUT32 ref: 0045EA6D
                                              • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                              • __swprintf.LIBCMT ref: 0045EC33
                                              • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                              Strings
                                              • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                              • String ID: %4d%02d%02d%02d%02d%02d
                                              • API String ID: 2441338619-1568723262
                                              • Opcode ID: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                                              • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                              • Opcode Fuzzy Hash: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                                              • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                              APIs
                                              • VariantClear.OLEAUT32(?), ref: 0047031B
                                              • VariantClear.OLEAUT32(?), ref: 0047044F
                                              • VariantInit.OLEAUT32(?), ref: 004704A3
                                              • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                              • VariantClear.OLEAUT32(?), ref: 00470516
                                                • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                              • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                              • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$Clear$Copy$CallDispFuncInit
                                              • String ID: H
                                              • API String ID: 3613100350-2852464175
                                              • Opcode ID: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                                              • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                              • Opcode Fuzzy Hash: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                                              • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                              APIs
                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                              • String ID:
                                              • API String ID: 1291720006-3916222277
                                              • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                              • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                              • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                              • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                              APIs
                                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                              • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                              • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                              • GetClientRect.USER32(?,?), ref: 00471A1A
                                              • DestroyCursor.USER32(?), ref: 00471AF4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$ClientCursorDestroyExtractIconRect
                                              • String ID: 2
                                              • API String ID: 1821208316-450215437
                                              • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                              • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                              • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                              • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                              • IsMenu.USER32(?), ref: 0045FC5F
                                              • CreatePopupMenu.USER32 ref: 0045FC97
                                              • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                                              • String ID: 0$2
                                              • API String ID: 93392585-3793063076
                                              • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                              • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                              • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                              • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: static
                                              • API String ID: 0-2160076837
                                              • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                              • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                              • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                              • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                              APIs
                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                              • VariantClear.OLEAUT32(?), ref: 00435320
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                              • VariantClear.OLEAUT32(?), ref: 004353B3
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                              • String ID: crts
                                              • API String ID: 586820018-3724388283
                                              • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                              • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                              • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                              • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                              APIs
                                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\shipping documents.exe,0040F545,C:\Users\user\Desktop\shipping documents.exe,004A90E8,C:\Users\user\Desktop\shipping documents.exe,?,0040F545), ref: 0041013C
                                              • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                              • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                              • _wcscat.LIBCMT ref: 0044BCAF
                                              • _wcslen.LIBCMT ref: 0044BCBB
                                              • _wcslen.LIBCMT ref: 0044BCD1
                                              • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                              • String ID: \*.*
                                              • API String ID: 2326526234-1173974218
                                              • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                              • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                              • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                              • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                              APIs
                                                • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                              • _wcslen.LIBCMT ref: 004335F2
                                              • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                              • GetLastError.KERNEL32 ref: 0043362B
                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                              • _wcsrchr.LIBCMT ref: 00433666
                                                • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                              • String ID: \
                                              • API String ID: 321622961-2967466578
                                              • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                              • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                              • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                              • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsnicmp
                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                              • API String ID: 1038674560-2734436370
                                              • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                              • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                              • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                              • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                                              • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                              • Opcode Fuzzy Hash: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                                              • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                              APIs
                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                              • __lock.LIBCMT ref: 00417981
                                                • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                • Part of subcall function 004182CB: RtlEnterCriticalSection.NTDLL(004115F6), ref: 004182F5
                                              • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                              • __lock.LIBCMT ref: 004179A2
                                              • ___addlocaleref.LIBCMT ref: 004179C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                              • String ID: KERNEL32.DLL$pI
                                              • API String ID: 637971194-197072765
                                              • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                              • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                              • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                              • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove$_malloc
                                              • String ID:
                                              • API String ID: 1938898002-0
                                              • Opcode ID: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                                              • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                              • Opcode Fuzzy Hash: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                                              • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                              • RtlEnterCriticalSection.NTDLL(?), ref: 0044B4F7
                                              • _memmove.LIBCMT ref: 0044B555
                                              • _memmove.LIBCMT ref: 0044B578
                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 0044B587
                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                              • String ID:
                                              • API String ID: 2737351978-0
                                              • Opcode ID: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                                              • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                              • Opcode Fuzzy Hash: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                                              • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                              • __calloc_crt.LIBCMT ref: 00415246
                                              • __getptd.LIBCMT ref: 00415253
                                              • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                              • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                              • _free.LIBCMT ref: 0041529E
                                              • __dosmaperr.LIBCMT ref: 004152A9
                                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                              • String ID:
                                              • API String ID: 3638380555-0
                                              • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                              • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                              • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                              • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                              APIs
                                              • WSAStartup.WS2_32(00000101,?), ref: 00465559
                                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                              • inet_addr.WS2_32(?), ref: 0046559B
                                              • gethostbyname.WS2_32(?), ref: 004655A6
                                              • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                              • _memmove.LIBCMT ref: 004656CA
                                              • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                              • WSACleanup.WS2_32 ref: 00465762
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                              • String ID:
                                              • API String ID: 2945290962-0
                                              • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                              • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                              • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                              • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                              APIs
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ConnectRegistry_memmove_wcslen
                                              • String ID:
                                              • API String ID: 15295421-0
                                              • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                              • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                              • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                              • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                              APIs
                                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                              • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                              • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                              • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                              • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                              • CloseFigure.GDI32(?), ref: 0044751F
                                              • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                              • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                              • String ID:
                                              • API String ID: 4082120231-0
                                              • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                              • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                              • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                              • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                              APIs
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                              • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                              • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                              • String ID:
                                              • API String ID: 2027346449-0
                                              • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                              • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                              • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                              • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                              APIs
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                              • GetMenu.USER32 ref: 0047A703
                                              • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                              • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                              • _wcslen.LIBCMT ref: 0047A79E
                                              • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                              • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                              • String ID:
                                              • API String ID: 3257027151-0
                                              • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                              • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                              • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                              • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                              APIs
                                              • select.WS2_32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                              • WSAGetLastError.WS2_32(00000000), ref: 0046D3E4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorLastselect
                                              • String ID:
                                              • API String ID: 215497628-0
                                              • Opcode ID: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                                              • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                              • Opcode Fuzzy Hash: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                                              • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                              APIs
                                              • GetParent.USER32(?), ref: 0044443B
                                              • GetKeyboardState.USER32(?), ref: 00444450
                                              • SetKeyboardState.USER32(?), ref: 004444A4
                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                              • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                              • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                              • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                              APIs
                                              • GetParent.USER32(?), ref: 00444633
                                              • GetKeyboardState.USER32(?), ref: 00444648
                                              • SetKeyboardState.USER32(?), ref: 0044469C
                                              • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                              • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                              • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                              • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$Parent
                                              • String ID:
                                              • API String ID: 87235514-0
                                              • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                              • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                              • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                              • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                              APIs
                                                • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                              • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                              • DeleteObject.GDI32(003D0000), ref: 00470A04
                                              • DestroyCursor.USER32(003A0043), ref: 00470A1C
                                              • DeleteObject.GDI32(3B1B1DD7), ref: 00470A34
                                              • DestroyCursor.USER32(?), ref: 00470A73
                                              • DestroyCursor.USER32(?), ref: 00470A81
                                              • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Destroy$Cursor$DeleteObject$AcceleratorInvalidateKillRectTableTimer
                                              • String ID:
                                              • API String ID: 2576045678-0
                                              • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                              • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                              • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                              • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                              APIs
                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$Enable$Show$MessageMoveSend
                                              • String ID:
                                              • API String ID: 896007046-0
                                              • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                              • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                              • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                              • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                              APIs
                                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                              • GetFocus.USER32 ref: 00448ACF
                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$Enable$Show$FocusMessageSend
                                              • String ID:
                                              • API String ID: 3429747543-0
                                              • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                              • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                              • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                              • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                              APIs
                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                              • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                              • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: Msctls_Progress32
                                              • API String ID: 3850602802-3636473452
                                              • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                              • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                              • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                              • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                              APIs
                                              • _malloc.LIBCMT ref: 0041F707
                                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 00413600
                                              • _free.LIBCMT ref: 0041F71A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AllocateHeap_free_malloc
                                              • String ID: [B
                                              • API String ID: 1020059152-632041663
                                              • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                              • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                              • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                              • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                              APIs
                                                • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                • Part of subcall function 00436B19: RtlAllocateHeap.NTDLL(00000000), ref: 00436B24
                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                              • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                              • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                                              • String ID:
                                              • API String ID: 1422014791-0
                                              • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                              • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                              • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                              • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                              APIs
                                              • GetClientRect.USER32(?,?), ref: 004302E6
                                              • GetWindowRect.USER32(00000000,?), ref: 00430316
                                              • GetClientRect.USER32(?,?), ref: 00430364
                                              • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                              • GetWindowRect.USER32(?,?), ref: 004303C3
                                              • ScreenToClient.USER32(?,?), ref: 004303EC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Rect$Client$Window$MetricsScreenSystem
                                              • String ID:
                                              • API String ID: 3220332590-0
                                              • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                              • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                              • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                              • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _malloc_wcslen$_strcat_wcscpy
                                              • String ID:
                                              • API String ID: 1612042205-0
                                              • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                              • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                              • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                              • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove_strncmp
                                              • String ID: >$U$\
                                              • API String ID: 2666721431-237099441
                                              • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                              • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                              • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                              • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                              APIs
                                              • GetKeyboardState.USER32(?), ref: 0044C570
                                              • SetKeyboardState.USER32(00000080), ref: 0044C594
                                              • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                              • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                              • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessagePost$KeyboardState$InputSend
                                              • String ID:
                                              • API String ID: 2221674350-0
                                              • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                              • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                              • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                              • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcscpy$_wcscat
                                              • String ID:
                                              • API String ID: 2037614760-0
                                              • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                              • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                              • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                              • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                              APIs
                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                              • 6F550200.COMCTL32(?,?), ref: 004553D3
                                              • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                              • DeleteObject.GDI32(?), ref: 00455736
                                              • DeleteObject.GDI32(?), ref: 00455744
                                              • DestroyCursor.USER32(?), ref: 00455752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DeleteMessageObjectSend$CursorDestroyF550200
                                              • String ID:
                                              • API String ID: 4181421608-0
                                              • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                              • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                              • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                              • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                              APIs
                                              • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                              • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                              • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                              • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                              • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                              • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$Copy$AllocClearErrorLastString
                                              • String ID:
                                              • API String ID: 960795272-0
                                              • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                              • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                              • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                              • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                              APIs
                                              • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                              • EndPaint.USER32(?,?), ref: 00447D13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                              • String ID:
                                              • API String ID: 4189319755-0
                                              • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                              • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                              • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                              • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                              APIs
                                              • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                              • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                              • ShowWindow.USER32(?,00000000), ref: 00440B18
                                              • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                              • EnableWindow.USER32(?,00000001), ref: 00440B50
                                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$Show$Enable$MessageSend
                                              • String ID:
                                              • API String ID: 642888154-0
                                              • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                              • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                              • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                              • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$Copy$ClearErrorLast
                                              • String ID: NULL Pointer assignment$Not an Object type
                                              • API String ID: 2487901850-572801152
                                              • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                              • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                              • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                              • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                              APIs
                                              • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$Enable$Show$MessageSend
                                              • String ID:
                                              • API String ID: 1871949834-0
                                              • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                              • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                              • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                              • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                              APIs
                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                              • _wcslen.LIBCMT ref: 004438CD
                                              • _wcslen.LIBCMT ref: 004438E6
                                              • _wcstok.LIBCMT ref: 004438F8
                                              • _wcslen.LIBCMT ref: 0044390C
                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                              • _wcstok.LIBCMT ref: 00443931
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                              • String ID:
                                              • API String ID: 3632110297-0
                                              • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                              • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                              • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                              • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                              APIs
                                              • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                              • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                              • String ID:
                                              • API String ID: 2833360925-0
                                              • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                              • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                              • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                              • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                              APIs
                                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                              • LineTo.GDI32(?,?,?), ref: 004472AC
                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                              • LineTo.GDI32(?,?,?), ref: 004472C6
                                              • EndPath.GDI32(?), ref: 004472D6
                                              • StrokePath.GDI32(?), ref: 004472E4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                              • String ID:
                                              • API String ID: 372113273-0
                                              • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                              • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                              • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                              • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                              APIs
                                              • __getptd.LIBCMT ref: 0041708E
                                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                              • __amsg_exit.LIBCMT ref: 004170AE
                                              • __lock.LIBCMT ref: 004170BE
                                              • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                              • _free.LIBCMT ref: 004170EE
                                              • InterlockedIncrement.KERNEL32(02EE2CE8), ref: 00417106
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                              • String ID:
                                              • API String ID: 3470314060-0
                                              • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                              • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                              • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                              • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                              APIs
                                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                              • RtlEnterCriticalSection.NTDLL(?), ref: 0044B666
                                              • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                              • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 0044B69E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                              • String ID:
                                              • API String ID: 3495660284-0
                                              • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                              • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                              • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                              • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                              APIs
                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Virtual
                                              • String ID:
                                              • API String ID: 4278518827-0
                                              • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                              • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                              • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                              • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                              APIs
                                                • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                              • RtlExitUserThread.NTDLL(00000000), ref: 004151ED
                                              • __freefls@4.LIBCMT ref: 00415209
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Value$ErrorExitLastThreadUser___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                              • String ID:
                                              • API String ID: 3590604804-0
                                              • Opcode ID: 9accb2c970c3ad42c36fa16d08c3c3a8e1e2ab1c4653ce7caab8e07ca954b280
                                              • Instruction ID: 33dbf055cdb8ff64cef25b7eefd28ade4c14083f8bd1581388e3e252127bbc8b
                                              • Opcode Fuzzy Hash: 9accb2c970c3ad42c36fa16d08c3c3a8e1e2ab1c4653ce7caab8e07ca954b280
                                              • Instruction Fuzzy Hash: B3F03675904705AFC704BFB2C9498CE7B75AF84349720845EB90847222DA3CD8C2CA59
                                              APIs
                                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                              • RtlExitUserThread.NTDLL(00000000), ref: 004151ED
                                              • __freefls@4.LIBCMT ref: 00415209
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Value$ErrorExitLastThreadUser___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                              • String ID:
                                              • API String ID: 3516609193-0
                                              • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                              • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                              • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                              • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                              APIs
                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                              • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                              • _wcslen.LIBCMT ref: 0045F94A
                                              • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                              • String ID: 0
                                              • API String ID: 621800784-4108050209
                                              • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                              • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                              • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                              • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                              APIs
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              • _wcstok.LIBCMT ref: 004675B2
                                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                              • _wcscpy.LIBCMT ref: 00467641
                                              • _wcslen.LIBCMT ref: 00467793
                                              • _wcslen.LIBCMT ref: 004677BD
                                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                              • 7523D1A0.COMDLG32(00000058), ref: 00467807
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$_memmove$7523__getptd_wcscpy_wcstok
                                              • String ID: X
                                              • API String ID: 4077627263-3081909835
                                              • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                              • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                              • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                              • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                              APIs
                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                              • IsMenu.USER32(?), ref: 0044854D
                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                              • DrawMenuBar.USER32 ref: 004485AF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$Item$DrawInfoInsert
                                              • String ID: 0
                                              • API String ID: 3076010158-4108050209
                                              • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                              • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                              • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                              • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                              APIs
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                              • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$_memmove_wcslen
                                              • String ID: ComboBox$ListBox
                                              • API String ID: 1589278365-1403004172
                                              • Opcode ID: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                                              • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                              • Opcode Fuzzy Hash: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                                              • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Handle
                                              • String ID: nul
                                              • API String ID: 2519475695-2873401336
                                              • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                              • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                              • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                              • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                              APIs
                                              • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Handle
                                              • String ID: nul
                                              • API String ID: 2519475695-2873401336
                                              • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                              • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                              • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                              • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                              APIs
                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                              • __swprintf.LIBCMT ref: 0045D4E9
                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorMode$InformationVolume__swprintf
                                              • String ID: %lu
                                              • API String ID: 3164766367-685833217
                                              • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                              • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                              • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                              • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                              APIs
                                              • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                              • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                              • String ID:
                                              • API String ID: 3488606520-0
                                              • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                              • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                              • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                              • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                              APIs
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ConnectRegistry_memmove_wcslen
                                              • String ID:
                                              • API String ID: 15295421-0
                                              • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                              • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                              • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                              • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                              APIs
                                              • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                              • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                              • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressProc$Library$FreeLoad
                                              • String ID:
                                              • API String ID: 2449869053-0
                                              • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                              • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                              • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                              • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                              • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                              • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                              • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                              APIs
                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                              • Sleep.KERNEL32(0000000A), ref: 0047D455
                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Interlocked$DecrementIncrement$Sleep
                                              • String ID:
                                              • API String ID: 327565842-0
                                              • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                              • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                              • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                              • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                              APIs
                                              • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                              • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                              • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                              • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: PrivateProfile$SectionWrite$String
                                              • String ID:
                                              • API String ID: 2832842796-0
                                              • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                              • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                              • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                              • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                              APIs
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                              • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Enum$CloseDeleteOpen
                                              • String ID:
                                              • API String ID: 2095303065-0
                                              • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                              • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                              • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                              • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00436A24
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: RectWindow
                                              • String ID:
                                              • API String ID: 861336768-0
                                              • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                              • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                              • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                              • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                              APIs
                                              • SendMessageW.USER32 ref: 00449598
                                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                              • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                              • _wcslen.LIBCMT ref: 0044960D
                                              • _wcslen.LIBCMT ref: 0044961A
                                              • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$_wcslen$_wcspbrk
                                              • String ID:
                                              • API String ID: 1856069659-0
                                              • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                              • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                              • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                              • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                              • EndPaint.USER32(?,?), ref: 00447D13
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ClientPaintRectRectangleScreenViewportWindow
                                              • String ID:
                                              • API String ID: 659298297-0
                                              • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                              • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                              • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                              • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                              APIs
                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                • Part of subcall function 00440D98: SendMessageW.USER32(02EE1B30,000000F1,00000000,00000000), ref: 00440E6E
                                                • Part of subcall function 00440D98: SendMessageW.USER32(02EE1B30,000000F1,00000001,00000000), ref: 00440E9A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$EnableMessageSend$Show
                                              • String ID:
                                              • API String ID: 476717838-0
                                              • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                              • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                              • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                              • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00445879
                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                              • _wcslen.LIBCMT ref: 004458FB
                                              • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                              • String ID:
                                              • API String ID: 3087257052-0
                                              • Opcode ID: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                                              • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                              • Opcode Fuzzy Hash: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                                              • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Destroy$DeleteMenuObject$Cursor
                                              • String ID:
                                              • API String ID: 1736985952-0
                                              • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                              • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                              • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                              • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                              APIs
                                                • Part of subcall function 00465225: inet_addr.WS2_32(?), ref: 00465249
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 004653FE
                                              • WSAGetLastError.WS2_32(00000000), ref: 0046540D
                                              • connect.WS2_32(00000000,?,00000010), ref: 00465446
                                              • WSAGetLastError.WS2_32(00000000), ref: 0046546D
                                              • closesocket.WS2_32(00000000), ref: 00465481
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                              • String ID:
                                              • API String ID: 245547762-0
                                              • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                              • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                              • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                              • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                              APIs
                                              • DeleteObject.GDI32(00000000), ref: 004471D8
                                              • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                              • SelectObject.GDI32(?,00000000), ref: 00447228
                                              • BeginPath.GDI32(?), ref: 0044723D
                                              • SelectObject.GDI32(?,00000000), ref: 00447266
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Object$Select$BeginCreateDeletePath
                                              • String ID:
                                              • API String ID: 2338827641-0
                                              • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                              • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                              • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                              • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                              APIs
                                              • Sleep.KERNEL32(00000000), ref: 00434598
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                              • Sleep.KERNEL32(00000000), ref: 004345D4
                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CounterPerformanceQuerySleep
                                              • String ID:
                                              • API String ID: 2875609808-0
                                              • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                              • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                              • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                              • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                              APIs
                                              • SendMessageW.USER32 ref: 004555C7
                                              • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                              • DeleteObject.GDI32(?), ref: 00455736
                                              • DeleteObject.GDI32(?), ref: 00455744
                                              • DestroyCursor.USER32(?), ref: 00455752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DeleteMessageObjectSend$CursorDestroy
                                              • String ID:
                                              • API String ID: 200077650-0
                                              • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                              • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                              • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                              • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                              APIs
                                              • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                              • MessageBeep.USER32(00000000), ref: 00460C46
                                              • KillTimer.USER32(?,0000040A), ref: 00460C68
                                              • EndDialog.USER32(?,00000001), ref: 00460C83
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                              • String ID:
                                              • API String ID: 3741023627-0
                                              • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                              • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                              • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                              • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                              APIs
                                              • __getptd.LIBCMT ref: 0041780F
                                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                              • __getptd.LIBCMT ref: 00417826
                                              • __amsg_exit.LIBCMT ref: 00417834
                                              • __lock.LIBCMT ref: 00417844
                                              • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                              • String ID:
                                              • API String ID: 938513278-0
                                              • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                              • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                              • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                              • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 5$8$^
                                              • API String ID: 0-3622883839
                                              • Opcode ID: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
                                              • Instruction ID: 6ee989b57c56cc683e8081b45a60e8d88641feefa2b309a8211b066407c3f2e5
                                              • Opcode Fuzzy Hash: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
                                              • Instruction Fuzzy Hash: 82F1B4B1D00649AACB24CFA9C940AEEFBF4EF84300F14856FE455E7351E3B89A45CB56
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: )$U$\
                                              • API String ID: 0-3705770531
                                              • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                              • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                              • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                              • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                              APIs
                                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                              • CoInitialize.OLE32(00000000), ref: 0046E505
                                              • CoCreateInstance.COMBASE(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                              • CoUninitialize.COMBASE ref: 0046E53D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                              • String ID: .lnk
                                              • API String ID: 886957087-24824748
                                              • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                              • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                              • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                              • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                              Strings
                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                              • API String ID: 708495834-557222456
                                              • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                              • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                              • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                              • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                              APIs
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • _memmove.LIBCMT ref: 00409D96
                                              • VariantInit.OLEAUT32(00000000), ref: 00429B91
                                              • VariantCopy.OLEAUT32(?,?), ref: 00429B9F
                                              • VariantClear.OLEAUT32(00000000), ref: 00429BB0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$ClearCopyInit_malloc_memmove
                                              • String ID: p@
                                              • API String ID: 441919481-1482256116
                                              • Opcode ID: 4e113184ffd57d60fe0b1cd2e5aa32bdf4329e1695ea6de4d28da55b5ee6823b
                                              • Instruction ID: f0c45ee732be7bd7eb5f6f37e092b4ba3ebced0f60d366c0991e47852fee2757
                                              • Opcode Fuzzy Hash: 4e113184ffd57d60fe0b1cd2e5aa32bdf4329e1695ea6de4d28da55b5ee6823b
                                              • Instruction Fuzzy Hash: E1915870A083518FD720CF29D580A1ABBE1FF89300F64892EE995CB351D375EC81CB96
                                              APIs
                                                • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                              • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                              • String ID: @
                                              • API String ID: 4150878124-2766056989
                                              • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                              • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                              • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                              • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: \$]$h
                                              • API String ID: 4104443479-3262404753
                                              • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                              • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                              • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                              • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                              APIs
                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                              • CloseHandle.KERNEL32(?), ref: 00457E09
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                              • String ID: <$@
                                              • API String ID: 2417854910-1426351568
                                              • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                              • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                              • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                              • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                              APIs
                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                              • String ID:
                                              • API String ID: 3705125965-3916222277
                                              • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                              • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                              • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                              • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                              APIs
                                              • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                              • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                              • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$Delete$InfoItem
                                              • String ID: 0
                                              • API String ID: 135850232-4108050209
                                              • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                              • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                              • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                              • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                              APIs
                                              • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                              • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                              • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Library$AddressFreeLoadProc
                                              • String ID: AU3_GetPluginDetails
                                              • API String ID: 145871493-4132174516
                                              • Opcode ID: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                                              • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                              • Opcode Fuzzy Hash: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                                              • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: $<
                                              • API String ID: 4104443479-428540627
                                              • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                              • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                              • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                              • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: SysAnimate32
                                              • API String ID: 0-1011021900
                                              • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                              • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                              • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                              • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                              APIs
                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                              • GetFocus.USER32 ref: 0046157B
                                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                              • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                              • __swprintf.LIBCMT ref: 00461608
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Thread$Parent$AttachClassCurrentFocusInputMessageNameProcessSendTimeoutWindow__swprintf_memmove_wcslen
                                              • String ID: %s%d
                                              • API String ID: 2260874675-1110647743
                                              • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                              • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                              • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                              • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                              APIs
                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                              • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: msctls_trackbar32
                                              • API String ID: 3850602802-1010561917
                                              • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                              • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                              • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                              • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                              APIs
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • CLSIDFromString.COMBASE(?,00000000), ref: 00435236
                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                              • String ID: crts
                                              • API String ID: 943502515-3724388283
                                              • Opcode ID: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                                              • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                              • Opcode Fuzzy Hash: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                                              • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                              APIs
                                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                              • CoInitialize.OLE32(00000000), ref: 0046E505
                                              • CoCreateInstance.COMBASE(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                              • CoUninitialize.COMBASE ref: 0046E53D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                              • String ID: .lnk
                                              • API String ID: 886957087-24824748
                                              • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                                              • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
                                              • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
                                              • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
                                              APIs
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • GetMenuItemInfoW.USER32 ref: 00449727
                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                              • DrawMenuBar.USER32 ref: 00449761
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Menu$InfoItem$Draw_malloc
                                              • String ID: 0
                                              • API String ID: 772068139-4108050209
                                              • Opcode ID: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                                              • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                              • Opcode Fuzzy Hash: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                                              • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$_wcscpy
                                              • String ID: 3, 3, 8, 1
                                              • API String ID: 3469035223-357260408
                                              • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                              • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                              • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                              • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                              APIs
                                                • Part of subcall function 0044B63B: InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                • Part of subcall function 0044B63B: RtlEnterCriticalSection.NTDLL(?), ref: 0044B666
                                                • Part of subcall function 0044B63B: TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                • Part of subcall function 0044B63B: WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                • Part of subcall function 0044B63B: InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                • Part of subcall function 0044B63B: RtlLeaveCriticalSection.NTDLL(?), ref: 0044B69E
                                              • CloseHandle.KERNEL32(?,?,?,?,0045EF86), ref: 0045355F
                                              • CloseHandle.KERNEL32(?,?,?,?,0045EF86), ref: 00453565
                                              • RtlDeleteCriticalSection.NTDLL(?), ref: 00453577
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CriticalSection$CloseExchangeHandleInterlocked$DeleteEnterLeaveObjectSingleTerminateThreadWait
                                              • String ID: {E
                                              • API String ID: 2929296749-1608756074
                                              • Opcode ID: a911d5f0f2b29358016350e38452cdc20ef496da080184d5b24206c8d82ed750
                                              • Instruction ID: 40d5d9fa8b8c1fd94b786f6cb2cb6fe4e30fd297486879efaf90dba77b0c3ce2
                                              • Opcode Fuzzy Hash: a911d5f0f2b29358016350e38452cdc20ef496da080184d5b24206c8d82ed750
                                              • Instruction Fuzzy Hash: 50E012B64106109BC320BF69E944C8BF3ECEED93103454D1FE54183620DBB8F445CBA5
                                              APIs
                                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                              • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: ICMP.DLL$IcmpCloseHandle
                                              • API String ID: 2574300362-3530519716
                                              • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                              • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                              • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                              • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                              APIs
                                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                              • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: ICMP.DLL$IcmpCreateFile
                                              • API String ID: 2574300362-275556492
                                              • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                              • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                              • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                              • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                              APIs
                                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                              • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: ICMP.DLL$IcmpSendEcho
                                              • API String ID: 2574300362-58917771
                                              • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                              • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                              • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                              • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                              APIs
                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AddressLibraryLoadProc
                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                              • API String ID: 2574300362-4033151799
                                              • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                              • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                              • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                              • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                              • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                              • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                              • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                              APIs
                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                              • SetErrorMode.KERNEL32 ref: 004781CE
                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                              • SetErrorMode.KERNEL32(?), ref: 00478270
                                              • SetErrorMode.KERNEL32(?), ref: 00478340
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                              • String ID:
                                              • API String ID: 3884216118-0
                                              • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                              • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                              • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                              • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                              APIs
                                              • VariantInit.OLEAUT32(?), ref: 0047950F
                                              • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                              • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                              • VariantClear.OLEAUT32(?), ref: 00479650
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Variant$AllocClearCopyInitString
                                              • String ID:
                                              • API String ID: 2808897238-0
                                              • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                              • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                              • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                              • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                              APIs
                                                • Part of subcall function 00410AB0: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                • Part of subcall function 00410AB0: MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                • Part of subcall function 00410AB0: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                • Part of subcall function 00410AB0: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                • Part of subcall function 00410AB0: MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                • Part of subcall function 00410AB0: MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                • Part of subcall function 0040D0D0: RegisterClipboardFormatW.USER32(WM_GETCONTROLNAME), ref: 0040D136
                                              • GetStdHandle.KERNEL32(000000F6,004A85F4,00000000), ref: 0040CA79
                                              • CloseHandle.KERNEL32(00000000,00000000), ref: 00429650
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Virtual$Handle$ClipboardCloseFormatRegister
                                              • String ID: 4*D$bZB
                                              • API String ID: 3011989096-1988179107
                                              • Opcode ID: 88a7144b9d7b6778b45769f597413659db4cebbfee4e456ba0e532492735f637
                                              • Instruction ID: 642e6593f096197b087bde2e39e3b9fca1e3311799ae6dff7eb1a797681d13c7
                                              • Opcode Fuzzy Hash: 88a7144b9d7b6778b45769f597413659db4cebbfee4e456ba0e532492735f637
                                              • Instruction Fuzzy Hash: 6771CAB2D016018AD700DF6AAD90666BFA4FB5B30479086BFD80887272DF780855CF8D
                                              APIs
                                              • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                              • __itow.LIBCMT ref: 004699CD
                                                • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                              • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                              • __itow.LIBCMT ref: 00469A97
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$__itow
                                              • String ID:
                                              • API String ID: 3379773720-0
                                              • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                              • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                              • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                              • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00449A4A
                                              • ScreenToClient.USER32(?,?), ref: 00449A80
                                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$ClientMoveRectScreen
                                              • String ID:
                                              • API String ID: 3880355969-0
                                              • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                              • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                              • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                              • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                              • String ID:
                                              • API String ID: 2782032738-0
                                              • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                              • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                              • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                              • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                              APIs
                                              • GetCursorPos.USER32(?), ref: 004563A6
                                              • ScreenToClient.USER32(?,?), ref: 004563C3
                                              • GetAsyncKeyState.USER32(?), ref: 00456400
                                              • GetAsyncKeyState.USER32(?), ref: 00456410
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: AsyncState$ClientCursorScreen
                                              • String ID:
                                              • API String ID: 4210589936-0
                                              • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                              • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                              • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                              • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                              APIs
                                              • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                              • GetWindowRect.USER32(?,?), ref: 00441722
                                              • PtInRect.USER32(?,?,?), ref: 00441734
                                              • MessageBeep.USER32(00000000), ref: 004417AD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Rect$BeepClientMessageScreenWindow
                                              • String ID:
                                              • API String ID: 1352109105-0
                                              • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                              • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                              • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                              • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                              APIs
                                              • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                              • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                              • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                              • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$InvalidateRect
                                              • String ID:
                                              • API String ID: 2778011698-0
                                              • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                              • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                              • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                              • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                              APIs
                                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                              • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                              • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                              • String ID:
                                              • API String ID: 3321077145-0
                                              • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                              • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                              • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                              • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                              APIs
                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                              • __isleadbyte_l.LIBCMT ref: 004208A6
                                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                              • String ID:
                                              • API String ID: 3058430110-0
                                              • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                              • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                              • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                              • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                              APIs
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                              • TranslateMessage.USER32(?), ref: 00442B01
                                              • DispatchMessageW.USER32(?), ref: 00442B0B
                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Message$Peek$DispatchTranslate
                                              • String ID:
                                              • API String ID: 1795658109-0
                                              • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                              • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                              • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                              • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                              APIs
                                              • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                              • GetCaretPos.USER32(?), ref: 004743B2
                                              • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                              • GetForegroundWindow.USER32 ref: 004743EE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                              • String ID:
                                              • API String ID: 2759813231-0
                                              • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                              • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                              • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                              • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                              APIs
                                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                              • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                              • _wcslen.LIBCMT ref: 00449519
                                              • _wcslen.LIBCMT ref: 00449526
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend_wcslen$_wcspbrk
                                              • String ID:
                                              • API String ID: 2886238975-0
                                              • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                              • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                              • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                              • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __setmode$DebugOutputString_fprintf
                                              • String ID:
                                              • API String ID: 1792727568-0
                                              • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                              • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                              • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                              • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                              APIs
                                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                              • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                              • SendMessageW.USER32 ref: 00471AE3
                                              • DestroyCursor.USER32(?), ref: 00471AF4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend$CursorDestroyExtractIcon
                                              • String ID:
                                              • API String ID: 1216984388-0
                                              • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                              • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                              • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                              • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                              APIs
                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00455695
                                              • DeleteObject.GDI32(?), ref: 00455736
                                              • DeleteObject.GDI32(?), ref: 00455744
                                              • DestroyCursor.USER32(?), ref: 00455752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DeleteObject$CursorDestroyMoveWindow
                                              • String ID:
                                              • API String ID: 3883585953-0
                                              • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                              • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                              • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                              • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                              APIs
                                                • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                              • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                              • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: lstrcmpilstrcpylstrlen$_malloc
                                              • String ID: cdecl
                                              • API String ID: 3850814276-3896280584
                                              • Opcode ID: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                                              • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                              • Opcode Fuzzy Hash: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                                              • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                              APIs
                                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                              • gethostbyname.WS2_32(?), ref: 0046D42D
                                              • WSAGetLastError.WS2_32(00000000), ref: 0046D439
                                              • _memmove.LIBCMT ref: 0046D475
                                              • inet_ntoa.WS2_32(?), ref: 0046D481
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                              • String ID:
                                              • API String ID: 2502553879-0
                                              • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                              • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                              • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                              • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                              APIs
                                              • select.WS2_32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                              • __WSAFDIsSet.WS2_32(00000000,00000001), ref: 00458ACF
                                              • accept.WS2_32(00000000,00000000,00000000), ref: 00458ADE
                                              • WSAGetLastError.WS2_32(00000000), ref: 00458B03
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ErrorLastacceptselect
                                              • String ID:
                                              • API String ID: 385091864-0
                                              • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                              • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                              • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                              • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                              APIs
                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                              • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                              • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                              • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                              • GetStockObject.GDI32(00000011), ref: 00430258
                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                              • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Window$CreateMessageObjectSendShowStock
                                              • String ID:
                                              • API String ID: 1358664141-0
                                              • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                              • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                              • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                              • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                              • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                              • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                              • String ID:
                                              • API String ID: 2880819207-0
                                              • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                              • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                              • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                              • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                              APIs
                                              • GetWindowRect.USER32(?,?), ref: 00430BA2
                                              • ScreenToClient.USER32(?,?), ref: 00430BC1
                                              • ScreenToClient.USER32(?,?), ref: 00430BE2
                                              • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ClientRectScreen$InvalidateWindow
                                              • String ID:
                                              • API String ID: 357397906-0
                                              • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                              • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                              • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                              • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                              APIs
                                              • __wsplitpath.LIBCMT ref: 0043392E
                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                              • __wsplitpath.LIBCMT ref: 00433950
                                              • __wcsicoll.LIBCMT ref: 00433974
                                              • __wcsicoll.LIBCMT ref: 0043398A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                              • String ID:
                                              • API String ID: 1187119602-0
                                              • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                              • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                              • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                              • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcslen$_malloc_wcscat_wcscpy
                                              • String ID:
                                              • API String ID: 1597257046-0
                                              • Opcode ID: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                                              • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                              • Opcode Fuzzy Hash: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                                              • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                              APIs
                                              • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                              • DeleteObject.GDI32(?), ref: 00455736
                                              • DeleteObject.GDI32(?), ref: 00455744
                                              • DestroyCursor.USER32(?), ref: 00455752
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: DeleteObject$CursorDestroyMessageSend
                                              • String ID:
                                              • API String ID: 2743624342-0
                                              • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                              • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                              • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                              • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                              • __malloc_crt.LIBCMT ref: 0041F5B6
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: EnvironmentStrings$Free__malloc_crt
                                              • String ID:
                                              • API String ID: 237123855-0
                                              • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                              • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                              • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                              • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                              APIs
                                              • RtlEnterCriticalSection.NTDLL(?), ref: 0044B5F5
                                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 0044B61A
                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 0044B62C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                              • String ID:
                                              • API String ID: 2223660684-0
                                              • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                              • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                              • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                              • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                              APIs
                                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                              • LineTo.GDI32(?,?,?), ref: 00447326
                                              • EndPath.GDI32(?), ref: 00447336
                                              • StrokePath.GDI32(?), ref: 00447344
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                              • String ID:
                                              • API String ID: 2783949968-0
                                              • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                              • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                              • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                              • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                              APIs
                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                              • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                              • AttachThreadInput.USER32(00000000), ref: 004364AA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                              • String ID:
                                              • API String ID: 2710830443-0
                                              • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                              • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                              • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                              • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _strncmp
                                              • String ID: Q\E
                                              • API String ID: 909875538-2189900498
                                              • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                              • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                              • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                              • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove_strncmp
                                              • String ID: U$\
                                              • API String ID: 2666721431-100911408
                                              • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                              • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                              • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                              • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                              APIs
                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                              • __wcsnicmp.LIBCMT ref: 00467288
                                              • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                              • String ID: LPT
                                              • API String ID: 3035604524-1350329615
                                              • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                              • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                              • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                              • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: \$h
                                              • API String ID: 4104443479-677774858
                                              • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                              • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                              • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                              • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memcmp
                                              • String ID: &
                                              • API String ID: 2931989736-1010288
                                              • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                              • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                              • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                              • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: \
                                              • API String ID: 4104443479-2967466578
                                              • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                              • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                              • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                              • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                              APIs
                                              • _wcslen.LIBCMT ref: 00466825
                                              • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CrackInternet_wcslen
                                              • String ID: |
                                              • API String ID: 596671847-2343686810
                                              • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                              • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                              • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                              • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                              APIs
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: '
                                              • API String ID: 3850602802-1997036262
                                              • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                              • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                              • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                              • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: msctls_updown32
                                              • API String ID: 0-2298589950
                                              • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                              • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                              • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                              • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                              APIs
                                              • _strlen.LIBCMT ref: 0040F858
                                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                              • _sprintf.LIBCMT ref: 0040F9AE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove$_sprintf_strlen
                                              • String ID: %02X
                                              • API String ID: 1921645428-436463671
                                              • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                              • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                              • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                              • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                              APIs
                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: Combobox
                                              • API String ID: 3850602802-2096851135
                                              • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                              • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                              • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                              • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                              APIs
                                              • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: LengthMessageSendTextWindow
                                              • String ID: edit
                                              • API String ID: 2978978980-2167791130
                                              • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                              • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                              • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                              • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: htonsinet_addr
                                              • String ID: 255.255.255.255
                                              • API String ID: 3832099526-2422070025
                                              • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                              • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                              • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                              • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                              APIs
                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: InternetOpen
                                              • String ID: <local>
                                              • API String ID: 2038078732-4266983199
                                              • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                              • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                              • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                              • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: __fread_nolock_memmove
                                              • String ID: EA06
                                              • API String ID: 1988441806-3962188686
                                              • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                              • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                              • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                              • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _memmove
                                              • String ID: u,D
                                              • API String ID: 4104443479-3858472334
                                              • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                              • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                              • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                              • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                              APIs
                                              • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • wsprintfW.USER32 ref: 0045612A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: MessageSend_mallocwsprintf
                                              • String ID: %d/%02d/%02d
                                              • API String ID: 1262938277-328681919
                                              • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                              • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                              • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                              • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                              APIs
                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(00000014,00000FA0,00000000,?,004432DB,00000000,?), ref: 0044328B
                                              • InterlockedExchange.KERNEL32(00000034,000001F4), ref: 004432B3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
                                              • String ID: {E
                                              • API String ID: 4104817828-1608756074
                                              • Opcode ID: 39230d92ea98742b8f748da3e78d1da81529965bbb052e96944a423862ffa6a5
                                              • Instruction ID: 150109b0540e35bae19fd88449310bdd6c1cbd95540796ce94466d0283945d32
                                              • Opcode Fuzzy Hash: 39230d92ea98742b8f748da3e78d1da81529965bbb052e96944a423862ffa6a5
                                              • Instruction Fuzzy Hash: 80F05EB1100704ABD360DF94D909B87BBE8EB08714F40881DE98987A90D7B5B1088BA1
                                              APIs
                                              • InternetCloseHandle.WININET(?), ref: 00442663
                                              • InternetCloseHandle.WININET ref: 00442668
                                                • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: CloseHandleInternet$ObjectSingleWait
                                              • String ID: aeB
                                              • API String ID: 857135153-906807131
                                              • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                              • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                              • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                              • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                              APIs
                                              Strings
                                              • ^B, xrefs: 00433248
                                              • C:\Users\user\Desktop\shipping documents.exe, xrefs: 0043324B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: _wcsncpy
                                              • String ID: ^B$C:\Users\user\Desktop\shipping documents.exe
                                              • API String ID: 1735881322-802152325
                                              • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                              • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                              • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                              • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                              • PostMessageW.USER32(00000000), ref: 00441C05
                                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                              • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                              • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                              • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                              APIs
                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: FindMessagePostSleepWindow
                                              • String ID: Shell_TrayWnd
                                              • API String ID: 529655941-2988720461
                                              • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                              • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                              • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                              • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                              APIs
                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1722778015.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1722765755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.0000000000490000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722778015.00000000004B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722875147.00000000004B8000.00000080.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1722887785.00000000004BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_shipping documents.jbxd
                                              Similarity
                                              • API ID: Message_doexit
                                              • String ID: AutoIt$Error allocating memory.
                                              • API String ID: 1993061046-4017498283
                                              • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                              • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                              • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                              • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D