Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Proforma Invoice_pdf.exe

Overview

General Information

Sample name:Proforma Invoice_pdf.exe
Analysis ID:1533057
MD5:2cc9915f2b1e52706b15d2485a644292
SHA1:9f7e69ffd0ac1aab4ab140a65c29154936cc44f0
SHA256:e0a51dab9249aad74c757f08760efbc460508ca0442ae692d8bce498a022daf8
Infos:

Detection

FormBook
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Initial sample is a PE file and has a suspicious name
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • Proforma Invoice_pdf.exe (PID: 3524 cmdline: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe" MD5: 2CC9915F2B1E52706B15D2485A644292)
    • svchost.exe (PID: 3576 cmdline: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe" MD5: 54A47F6B5E09A77E61649109C6A08866)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2c370:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x143df:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2f763:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x177d2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e963:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x169d2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2f763:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x177d2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", CommandLine: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", ParentImage: C:\Users\user\Desktop\Proforma Invoice_pdf.exe, ParentProcessId: 3524, ParentProcessName: Proforma Invoice_pdf.exe, ProcessCommandLine: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", ProcessId: 3576, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", CommandLine: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", ParentImage: C:\Users\user\Desktop\Proforma Invoice_pdf.exe, ParentProcessId: 3524, ParentProcessName: Proforma Invoice_pdf.exe, ProcessCommandLine: "C:\Users\user\Desktop\Proforma Invoice_pdf.exe", ProcessId: 3576, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Proforma Invoice_pdf.exeVirustotal: Detection: 28%Perma Link
          Source: Proforma Invoice_pdf.exeReversingLabs: Detection: 44%
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: Proforma Invoice_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdb source: Proforma Invoice_pdf.exe, 00000000.00000003.355860040.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, Proforma Invoice_pdf.exe, 00000000.00000003.356145877.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.389960283.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.385396854.0000000000880000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.385045719.00000000002A0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.389960283.0000000000A10000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile,0_2_0044289D
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0046C5D0 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046C5D0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00456354
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C08E

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: initial sampleStatic PE information: Filename: Proforma Invoice_pdf.exe
          Source: initial sampleStatic PE information: Filename: Proforma Invoice_pdf.exe
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C9F3 NtClose,2_2_0042C9F3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A207AC NtCreateMutant,LdrInitializeThunk,2_2_00A207AC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1F9F0 NtClose,LdrInitializeThunk,2_2_00A1F9F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FAE8 NtQueryInformationProcess,LdrInitializeThunk,2_2_00A1FAE8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FB68 NtFreeVirtualMemory,LdrInitializeThunk,2_2_00A1FB68
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FDC0 NtQuerySystemInformation,LdrInitializeThunk,2_2_00A1FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A200C4 NtCreateFile,2_2_00A200C4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A20060 NtQuerySection,2_2_00A20060
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A20078 NtResumeThread,2_2_00A20078
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A20048 NtProtectVirtualMemory,2_2_00A20048
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A201D4 NtSetValueKey,2_2_00A201D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2010C NtOpenDirectoryObject,2_2_00A2010C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A20C40 NtGetContextThread,2_2_00A20C40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A210D0 NtOpenProcessToken,2_2_00A210D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A21148 NtOpenThread,2_2_00A21148
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1F8CC NtWaitForSingleObject,2_2_00A1F8CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A21930 NtSetContextThread,2_2_00A21930
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1F938 NtWriteFile,2_2_00A1F938
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1F900 NtReadFile,2_2_00A1F900
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FAB8 NtQueryValueKey,2_2_00A1FAB8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FAD0 NtAllocateVirtualMemory,2_2_00A1FAD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FA20 NtQueryInformationFile,2_2_00A1FA20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FA50 NtEnumerateValueKey,2_2_00A1FA50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FBB8 NtQueryInformationToken,2_2_00A1FBB8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FBE8 NtQueryVirtualMemory,2_2_00A1FBE8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FB50 NtCreateKey,2_2_00A1FB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FC90 NtUnmapViewOfSection,2_2_00A1FC90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FC30 NtOpenProcess,2_2_00A1FC30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FC60 NtMapViewOfSection,2_2_00A1FC60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FC48 NtSetInformationFile,2_2_00A1FC48
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A21D80 NtSuspendThread,2_2_00A21D80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FD8C NtDelayExecution,2_2_00A1FD8C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FD5C NtEnumerateKey,2_2_00A1FD5C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FEA0 NtReadVirtualMemory,2_2_00A1FEA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FED0 NtAdjustPrivilegesToken,2_2_00A1FED0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FE24 NtWriteVirtualMemory,2_2_00A1FE24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FFB4 NtCreateSection,2_2_00A1FFB4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FFFC NtCreateProcessEx,2_2_00A1FFFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A1FF34 NtQueueApcThread,2_2_00A1FF34
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00434D50
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004461ED
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00409A400_2_00409A40
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004120380_2_00412038
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0047E1FA0_2_0047E1FA
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0041A46B0_2_0041A46B
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0041240C0_2_0041240C
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004465660_2_00446566
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004045E00_2_004045E0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004128180_2_00412818
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0047CBF00_2_0047CBF0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00412C380_2_00412C38
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00424F700_2_00424F70
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0041AF0D0_2_0041AF0D
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004271610_2_00427161
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004212BE0_2_004212BE
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004433900_2_00443390
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004433910_2_00443391
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0041D7500_2_0041D750
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004037E00_2_004037E0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004278590_2_00427859
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0040F8900_2_0040F890
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0042397B0_2_0042397B
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00411B630_2_00411B63
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00423EBF0_2_00423EBF
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_034B03800_2_034B0380
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042F0532_2_0042F053
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028582_2_00402858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028602_2_00402860
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004031702_2_00403170
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041017B2_2_0041017B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004101832_2_00410183
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004011902_2_00401190
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416B432_2_00416B43
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416B3E2_2_00416B3E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004023D02_2_004023D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004103A32_2_004103A3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004014702_2_00401470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E4232_2_0040E423
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004025402_2_00402540
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004025392_2_00402539
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E0C62_2_00A2E0C6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2E2E92_2_00A2E2E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD63BF2_2_00AD63BF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A563DB2_2_00A563DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A323052_2_00A32305
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7A37B2_2_00A7A37B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB443E2_2_00AB443E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB05E32_2_00AB05E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4C5F02_2_00A4C5F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A765402_2_00A76540
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A346802_2_00A34680
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3E6C12_2_00A3E6C1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD26222_2_00AD2622
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7A6342_2_00A7A634
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3C7BC2_2_00A3C7BC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5286D2_2_00A5286D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3C85C2_2_00A3C85C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A329B22_2_00A329B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD098E2_2_00AD098E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC49F52_2_00AC49F5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A469FE2_2_00A469FE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A7C9202_2_00A7C920
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ADCBA42_2_00ADCBA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB6BCB2_2_00AB6BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD2C9C2_2_00AD2C9C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABAC5E2_2_00ABAC5E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A60D3B2_2_00A60D3B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3CD5B2_2_00A3CD5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A62E2F2_2_00A62E2F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4EE4C2_2_00A4EE4C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ACCFB12_2_00ACCFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AA2FDC2_2_00AA2FDC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A40F3F2_2_00A40F3F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5D0052_2_00A5D005
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAD06D2_2_00AAD06D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A330402_2_00A33040
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A4905A2_2_00A4905A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABD13F2_2_00ABD13F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AD12382_2_00AD1238
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2F3CF2_2_00A2F3CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A373532_2_00A37353
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A654852_2_00A65485
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A414892_2_00A41489
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A6D47D2_2_00A6D47D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A3351F2_2_00A3351F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB579A2_2_00AB579A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A657C32_2_00A657C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AC771D2_2_00AC771D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ACF8EE2_2_00ACF8EE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AAF8C42_2_00AAF8C4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB394B2_2_00AB394B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AB59552_2_00AB5955
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00AE3A832_2_00AE3A83
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABDBDA2_2_00ABDBDA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2FBD72_2_00A2FBD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A57B002_2_00A57B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ACFDDD2_2_00ACFDDD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00ABBF142_2_00ABBF14
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A5DF7C2_2_00A5DF7C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A2DF5C appears 137 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A9F970 appears 84 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A7373B appears 253 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A73F92 appears 132 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A2E2A8 appears 60 times
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: String function: 00445975 appears 65 times
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: String function: 0041171A appears 37 times
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: String function: 0041718C appears 45 times
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: String function: 0040E6D0 appears 35 times
          Source: Proforma Invoice_pdf.exe, 00000000.00000003.357258088.0000000003BBD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Proforma Invoice_pdf.exe
          Source: Proforma Invoice_pdf.exe, 00000000.00000003.356345124.0000000003D40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Proforma Invoice_pdf.exe
          Source: Proforma Invoice_pdf.exe, 00000000.00000002.357870662.000000000094B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesvchost.exej% vs Proforma Invoice_pdf.exe
          Source: Proforma Invoice_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal88.troj.evad.winEXE@3/1@0/0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0044AF5C GetLastError,FormatMessageW,0_2_0044AF5C
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464422
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D517
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,0_2_0043701F
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,0_2_0047A999
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043614F
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\endochylousJump to behavior
          Source: Proforma Invoice_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Proforma Invoice_pdf.exeVirustotal: Detection: 28%
          Source: Proforma Invoice_pdf.exeReversingLabs: Detection: 44%
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeFile read: C:\Users\user\Desktop\Proforma Invoice_pdf.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Proforma Invoice_pdf.exe "C:\Users\user\Desktop\Proforma Invoice_pdf.exe"
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Proforma Invoice_pdf.exe"
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Proforma Invoice_pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wow64cpu.dllJump to behavior
          Source: Proforma Invoice_pdf.exeStatic file information: File size 1337369 > 1048576
          Source: Binary string: wntdll.pdb source: Proforma Invoice_pdf.exe, 00000000.00000003.355860040.0000000003C40000.00000004.00001000.00020000.00000000.sdmp, Proforma Invoice_pdf.exe, 00000000.00000003.356145877.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.389960283.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.385396854.0000000000880000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.385045719.00000000002A0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.389960283.0000000000A10000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
          Source: Proforma Invoice_pdf.exeStatic PE information: real checksum: 0xa2135 should be: 0x15026c
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004171D1 push ecx; ret 0_2_004171E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040C15B push 00000006h; iretd 2_2_0040C15D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414193 push ss; ret 2_2_00414194
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004159A1 push 35D13253h; ret 2_2_004159A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408A24 push esi; retf 2_2_00408A26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00412379 push ebx; retf 2_2_0041238C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040531A pushad ; ret 2_2_0040532C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004033F0 push eax; ret 2_2_004033F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A4CE push cs; retf 2_2_0041A4D2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404CAF push ebp; iretd 2_2_00404CBC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00411EC2 push 00000018h; ret 2_2_00411ED8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404EA1 push es; ret 2_2_00404EA2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A2DFA1 push ecx; ret 2_2_00A2DFB4
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004772DE
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004440780_2_00444078
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeAPI/Special instruction interceptor: Address: 34AFFA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A70101 rdtsc 2_2_00A70101
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeAPI coverage: 3.0 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 3580Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A70101 rdtsc 2_2_00A70101
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A207AC NtCreateMutant,LdrInitializeThunk,2_2_00A207AC
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0045A259 BlockInput,0_2_0045A259
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_034B0270 mov eax, dword ptr fs:[00000030h]0_2_034B0270
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_034B0210 mov eax, dword ptr fs:[00000030h]0_2_034B0210
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_034AEBF0 mov eax, dword ptr fs:[00000030h]0_2_034AEBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A10080 mov ecx, dword ptr fs:[00000030h]2_2_00A10080
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A100EA mov eax, dword ptr fs:[00000030h]2_2_00A100EA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A326F8 mov eax, dword ptr fs:[00000030h]2_2_00A326F8
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00426DA1
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0042202E SetUnhandledExceptionFilter,0_2_0042202E
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004230F5
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417D93
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421FA7

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 7EFDE008Jump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0043916A LogonUserW,0_2_0043916A
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_00436431
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Proforma Invoice_pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00445DD3
          Source: Proforma Invoice_pdf.exeBinary or memory string: Shell_TrayWnd
          Source: Proforma Invoice_pdf.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_00410D10 cpuid 0_2_00410D10
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004223BC
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004711D2 GetUserNameW,0_2_004711D2
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_0042039F
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Proforma Invoice_pdf.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
          Source: Proforma Invoice_pdf.exeBinary or memory string: WIN_XP
          Source: Proforma Invoice_pdf.exeBinary or memory string: WIN_XPe
          Source: Proforma Invoice_pdf.exeBinary or memory string: WIN_VISTA
          Source: Proforma Invoice_pdf.exeBinary or memory string: WIN_7

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004741BB
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,0_2_0046483C
          Source: C:\Users\user\Desktop\Proforma Invoice_pdf.exeCode function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0047AD92
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          1
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory24
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem2
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Proforma Invoice_pdf.exe29%VirustotalBrowse
          Proforma Invoice_pdf.exe45%ReversingLabsWin32.Trojan.Swotter
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1533057
          Start date and time:2024-10-14 11:29:07 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 28s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:3
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Proforma Invoice_pdf.exe
          Detection:MAL
          Classification:mal88.troj.evad.winEXE@3/1@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 96%
          • Number of executed functions: 43
          • Number of non-executed functions: 319
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Report size exceeded maximum capacity and may have missing disassembly code.
          TimeTypeDescription
          05:30:15API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\Proforma Invoice_pdf.exe
          File Type:data
          Category:dropped
          Size (bytes):289280
          Entropy (8bit):7.992073045722049
          Encrypted:true
          SSDEEP:6144:FrtjgTvY4p522fCoK7oSiO7tNt346MexE:MR522jKMO7OsE
          MD5:BE64EC96B1AF5213100B243F97422518
          SHA1:7742A4F2E141A83979B3C8C8E24514F99F2C114C
          SHA-256:34FDF4AF7168653B64FD3D32DAE13C2DDF475A2694788B5492EDFFA0957DE366
          SHA-512:1183F1D3C878CF9664458627B51A55E2100851E9D39DA7DF24EC51A5C5B49D4959178766DE60CAC4B96FF209A98CE229E8AD7DE7F0F50DBFCEB40B10D9156B5C
          Malicious:false
          Reputation:low
          Preview:.o...7X5M..<...d.MJ...f[F..MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN.X5MGZ.;N.G.y.L..wa&1=.(G".77Xn;/Y6Z9i'3.<- .1[m....#7*Rv8@CaV5NXN7XLL@.kU).sW?.p)"./...8R.S...r8).B..y6R..'T0.-..V5NXN7X5..EVyOYN.l..IEV5NXN7.5OHNW>NX.3X5MIEV5NX>#X5MYEV5>\N7XuMIUV5NZN7^5MIEV5N^N7X5MIEVEJXN5X5MIEV7N..7X%MIUV5NX^7X%MIEV5NHN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5Nv:R AMIE.bJXN'X5M.AV5^XN7X5MIEV5NXN7x5M)EV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MIEV5NXN7X5MI
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.495695303112877
          TrID:
          • Win32 Executable (generic) a (10002005/4) 95.11%
          • AutoIt3 compiled script executable (510682/80) 4.86%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Proforma Invoice_pdf.exe
          File size:1'337'369 bytes
          MD5:2cc9915f2b1e52706b15d2485a644292
          SHA1:9f7e69ffd0ac1aab4ab140a65c29154936cc44f0
          SHA256:e0a51dab9249aad74c757f08760efbc460508ca0442ae692d8bce498a022daf8
          SHA512:f68ef09aec3d5fcfa53561979c0cb326a9f7bae04016b8b090144a278469362d19e6e6f73a8a2a843a518e2d3774079175a907ffbd11da65ecd4c4074227b0bc
          SSDEEP:24576:TfmMv6Ckr7Mny5QULYoSPR7jOJjvWmS/ZNx2UkYjWy6NGi:T3v+7/5QULY3ljOpumKx2Ukvy6v
          TLSH:BF55F112F7D680B2EAA33971297BE32A9B357D194323C48B97E03E728F311515B36761
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
          Icon Hash:4cb1b19190919191
          Entrypoint:0x416310
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:0
          File Version Major:5
          File Version Minor:0
          Subsystem Version Major:5
          Subsystem Version Minor:0
          Import Hash:aaaa8913c89c8aa4a5d93f06853894da
          Instruction
          call 00007EFDB4DB4E9Ch
          jmp 00007EFDB4DA8C6Eh
          int3
          int3
          int3
          int3
          int3
          int3
          push ebp
          mov ebp, esp
          push edi
          push esi
          mov esi, dword ptr [ebp+0Ch]
          mov ecx, dword ptr [ebp+10h]
          mov edi, dword ptr [ebp+08h]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007EFDB4DA8DFAh
          cmp edi, eax
          jc 00007EFDB4DA8F9Ah
          cmp ecx, 00000100h
          jc 00007EFDB4DA8E11h
          cmp dword ptr [004A94E0h], 00000000h
          je 00007EFDB4DA8E08h
          push edi
          push esi
          and edi, 0Fh
          and esi, 0Fh
          cmp edi, esi
          pop esi
          pop edi
          jne 00007EFDB4DA8DFAh
          pop esi
          pop edi
          pop ebp
          jmp 00007EFDB4DA925Ah
          test edi, 00000003h
          jne 00007EFDB4DA8E07h
          shr ecx, 02h
          and edx, 03h
          cmp ecx, 08h
          jc 00007EFDB4DA8E1Ch
          rep movsd
          jmp dword ptr [00416494h+edx*4]
          nop
          mov eax, edi
          mov edx, 00000003h
          sub ecx, 04h
          jc 00007EFDB4DA8DFEh
          and eax, 03h
          add ecx, eax
          jmp dword ptr [004163A8h+eax*4]
          jmp dword ptr [004164A4h+ecx*4]
          nop
          jmp dword ptr [00416428h+ecx*4]
          nop
          mov eax, E4004163h
          arpl word ptr [ecx+00h], ax
          or byte ptr [ecx+eax*2+00h], ah
          and edx, ecx
          mov al, byte ptr [esi]
          mov byte ptr [edi], al
          mov al, byte ptr [esi+01h]
          mov byte ptr [edi+01h], al
          mov al, byte ptr [esi+02h]
          shr ecx, 02h
          mov byte ptr [edi+02h], al
          add esi, 03h
          add edi, 03h
          cmp ecx, 08h
          jc 00007EFDB4DA8DBEh
          Programming Language:
          • [ASM] VS2008 SP1 build 30729
          • [ C ] VS2008 SP1 build 30729
          • [C++] VS2008 SP1 build 30729
          • [ C ] VS2005 build 50727
          • [IMP] VS2005 build 50727
          • [ASM] VS2008 build 21022
          • [RES] VS2008 build 21022
          • [LNK] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000xb620.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xab0000xb6200xb800d740c2d675765e5a423ec15e09db3d5fFalse0.2766007133152174data4.2419136361238605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xab5080x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
          RT_ICON0xab6300x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
          RT_ICON0xab7580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xab8800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.44060283687943264
          RT_ICON0xabce80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishGreat Britain0.3848360655737705
          RT_ICON0xac6700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.34709193245778613
          RT_ICON0xad7180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.2949170124481328
          RT_ICON0xafcc00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.23730514879546527
          RT_MENU0xb3ee80x50dataEnglishGreat Britain0.9
          RT_DIALOG0xb3f380xfcdataEnglishGreat Britain0.6507936507936508
          RT_STRING0xb40380x530dataEnglishGreat Britain0.33960843373493976
          RT_STRING0xb45680x690dataEnglishGreat Britain0.26964285714285713
          RT_STRING0xb4bf80x43adataEnglishGreat Britain0.3733826247689464
          RT_STRING0xb50380x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xb56380x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xb5c980x388dataEnglishGreat Britain0.377212389380531
          RT_STRING0xb60200x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
          RT_GROUP_ICON0xb61780x4cdataEnglishGreat Britain0.8157894736842105
          RT_GROUP_ICON0xb61c80x14dataEnglishGreat Britain1.15
          RT_GROUP_ICON0xb61e00x14dataEnglishGreat Britain1.25
          RT_GROUP_ICON0xb61f80x14dataEnglishGreat Britain1.25
          RT_VERSION0xb62100x19cdataEnglishGreat Britain0.5339805825242718
          RT_MANIFEST0xb63b00x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
          DLLImport
          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
          USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
          GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
          OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:05:29:59
          Start date:14/10/2024
          Path:C:\Users\user\Desktop\Proforma Invoice_pdf.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\Proforma Invoice_pdf.exe"
          Imagebase:0x400000
          File size:1'337'369 bytes
          MD5 hash:2CC9915F2B1E52706B15D2485A644292
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:2
          Start time:05:30:01
          Start date:14/10/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\Proforma Invoice_pdf.exe"
          Imagebase:0x190000
          File size:20'992 bytes
          MD5 hash:54A47F6B5E09A77E61649109C6A08866
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.389879638.00000000000F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.389902818.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
          Reputation:moderate
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.3%
            Dynamic/Decrypted Code Coverage:1%
            Signature Coverage:3.1%
            Total number of Nodes:1672
            Total number of Limit Nodes:46
            execution_graph 80967 4444e4 80972 40d900 80967->80972 80969 4444ee 80976 43723d 80969->80976 80971 444504 80973 40d917 80972->80973 80974 40d909 80972->80974 80973->80974 80975 40d91c CloseHandle 80973->80975 80974->80969 80975->80969 80977 40d900 CloseHandle 80976->80977 80978 437247 moneypunct 80977->80978 80978->80971 80979 4169e0 80982 41696e TlsGetValue 80979->80982 80983 4169a7 GetModuleHandleW 80982->80983 80984 416986 80982->80984 80986 4169c2 GetProcAddress 80983->80986 80987 4169b7 80983->80987 80984->80983 80985 416990 TlsGetValue 80984->80985 80992 41699b 80985->80992 80988 41699f 80986->80988 80994 41177f Sleep GetModuleHandleW 80987->80994 80990 4169d2 RtlEncodePointer 80988->80990 80991 4169da 80988->80991 80990->80991 80992->80983 80992->80988 80993 4169bd 80993->80986 80993->80991 80994->80993 80995 444343 80998 444326 80995->80998 80997 44434e WriteFile 80999 444340 80998->80999 81000 4442c7 80998->81000 80999->80997 81005 40e190 SetFilePointerEx 81000->81005 81002 4442e0 SetFilePointerEx 81006 40e190 SetFilePointerEx 81002->81006 81004 4442ff 81004->80997 81005->81002 81006->81004 81007 46d22f 81010 46d098 81007->81010 81009 46d241 81011 46d0b5 81010->81011 81012 46d115 81011->81012 81013 46d0b9 81011->81013 81077 45c216 80 API calls 81012->81077 81054 41171a 81013->81054 81017 46d126 81019 46d0f8 81017->81019 81025 46d142 81017->81025 81018 46d0cc 81067 453063 81018->81067 81073 4092c0 81019->81073 81022 46d0fd 81022->81009 81026 46d1c8 81025->81026 81029 46d158 81025->81029 81086 4676a3 80 API calls 81026->81086 81032 453063 113 API calls 81029->81032 81030 46d0ea 81030->81025 81033 46d0ee 81030->81033 81031 46d1ce 81087 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 81031->81087 81041 46d15e 81032->81041 81033->81019 81072 44ade5 CloseHandle moneypunct 81033->81072 81034 46d18d 81078 467fce 84 API calls 81034->81078 81038 46d196 81079 4013a0 77 API calls 81038->81079 81039 46d1e7 81043 4092c0 VariantClear 81039->81043 81053 46d194 81039->81053 81041->81034 81041->81038 81042 46d1a2 81080 40df50 81042->81080 81043->81053 81047 46d224 81047->81009 81048 40d900 CloseHandle 81050 46d216 81048->81050 81049 46d1b8 81085 467fce 84 API calls 81049->81085 81088 44ade5 CloseHandle moneypunct 81050->81088 81053->81047 81053->81048 81056 411724 81054->81056 81057 41173e 81056->81057 81061 411740 std::bad_alloc::bad_alloc 81056->81061 81089 4138ba 81056->81089 81107 411afc 7 API calls __decode_pointer 81056->81107 81057->81018 81066 40d940 78 API calls 81057->81066 81060 411770 81112 41805b RaiseException 81060->81112 81065 411766 81061->81065 81108 411421 81061->81108 81064 41177e 81111 4116fd 69 API calls std::exception::exception 81065->81111 81066->81018 81068 45306e 81067->81068 81069 45307a 81067->81069 81068->81069 81241 452e2a 113 API calls 5 library calls 81068->81241 81071 40dfa0 85 API calls 81069->81071 81071->81030 81072->81019 81074 4092c8 moneypunct 81073->81074 81075 429db0 VariantClear 81074->81075 81076 4092d5 moneypunct 81074->81076 81075->81076 81076->81022 81077->81017 81078->81053 81079->81042 81081 40df61 81080->81081 81082 40df56 81080->81082 81084 40d3b0 77 API calls 2 library calls 81081->81084 81242 404080 77 API calls _memcpy_s 81082->81242 81084->81049 81085->81053 81086->81031 81087->81039 81088->81047 81090 41396d 81089->81090 81100 4138cc 81089->81100 81120 411afc 7 API calls __decode_pointer 81090->81120 81092 413973 81121 417f23 69 API calls __getptd_noexit 81092->81121 81097 413929 RtlAllocateHeap 81097->81100 81098 4138dd 81098->81100 81113 418252 69 API calls 2 library calls 81098->81113 81114 4180a7 69 API calls 7 library calls 81098->81114 81115 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 81098->81115 81100->81097 81100->81098 81101 413959 81100->81101 81104 41395e 81100->81104 81106 413965 81100->81106 81116 41386b 69 API calls 4 library calls 81100->81116 81117 411afc 7 API calls __decode_pointer 81100->81117 81118 417f23 69 API calls __getptd_noexit 81101->81118 81119 417f23 69 API calls __getptd_noexit 81104->81119 81106->81056 81107->81056 81122 4113e5 81108->81122 81110 41142e 81110->81065 81111->81060 81112->81064 81113->81098 81114->81098 81116->81100 81117->81100 81118->81104 81119->81106 81120->81092 81121->81106 81123 4113f1 __msize 81122->81123 81130 41181b 81123->81130 81129 411412 __msize 81129->81110 81156 418407 81130->81156 81132 4113f6 81133 4112fa 81132->81133 81221 4169e9 TlsGetValue 81133->81221 81136 4169e9 __decode_pointer 7 API calls 81137 41131e 81136->81137 81149 4113a1 81137->81149 81233 4170e7 70 API calls 4 library calls 81137->81233 81139 41133c 81140 411388 81139->81140 81142 411357 81139->81142 81143 411366 81139->81143 81141 41696e __encode_pointer 7 API calls 81140->81141 81144 411396 81141->81144 81234 417047 75 API calls _realloc 81142->81234 81146 411360 81143->81146 81143->81149 81147 41696e __encode_pointer 7 API calls 81144->81147 81146->81143 81150 41137c 81146->81150 81235 417047 75 API calls _realloc 81146->81235 81147->81149 81153 41141b 81149->81153 81152 41696e __encode_pointer 7 API calls 81150->81152 81151 411376 81151->81149 81151->81150 81152->81140 81237 411824 81153->81237 81157 41841c 81156->81157 81158 41842f EnterCriticalSection 81156->81158 81163 418344 81157->81163 81158->81132 81160 418422 81160->81158 81191 4117af 69 API calls 3 library calls 81160->81191 81162 41842e 81162->81158 81164 418350 __msize 81163->81164 81165 418360 81164->81165 81166 418378 81164->81166 81192 418252 69 API calls 2 library calls 81165->81192 81175 418386 __msize 81166->81175 81195 416fb6 81166->81195 81169 418365 81193 4180a7 69 API calls 7 library calls 81169->81193 81172 41836c 81194 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 81172->81194 81173 4183a7 81178 418407 __lock 69 API calls 81173->81178 81174 418398 81201 417f23 69 API calls __getptd_noexit 81174->81201 81175->81160 81180 4183ae 81178->81180 81181 4183e2 81180->81181 81182 4183b6 81180->81182 81183 413a88 ___freetlocinfo 69 API calls 81181->81183 81202 4189e6 InitializeCriticalSectionAndSpinCount __msize 81182->81202 81186 4183d3 81183->81186 81185 4183c1 81185->81186 81203 413a88 81185->81203 81217 4183fe LeaveCriticalSection _doexit 81186->81217 81189 4183cd 81216 417f23 69 API calls __getptd_noexit 81189->81216 81191->81162 81192->81169 81193->81172 81198 416fbf 81195->81198 81196 4138ba _malloc 68 API calls 81196->81198 81197 416ff5 81197->81173 81197->81174 81198->81196 81198->81197 81199 416fd6 Sleep 81198->81199 81200 416feb 81199->81200 81200->81197 81200->81198 81201->81175 81202->81185 81204 413a94 __msize 81203->81204 81205 413ad3 81204->81205 81207 418407 __lock 67 API calls 81204->81207 81211 413b0d __dosmaperr __msize 81204->81211 81206 413ae8 HeapFree 81205->81206 81205->81211 81208 413afa 81206->81208 81206->81211 81213 413aab ___sbh_find_block 81207->81213 81220 417f23 69 API calls __getptd_noexit 81208->81220 81210 413aff GetLastError 81210->81211 81211->81189 81212 413ac5 81219 413ade LeaveCriticalSection _doexit 81212->81219 81213->81212 81218 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree __cftoe2_l 81213->81218 81216->81186 81217->81175 81218->81212 81219->81205 81220->81210 81222 416a01 81221->81222 81223 416a22 GetModuleHandleW 81221->81223 81222->81223 81224 416a0b TlsGetValue 81222->81224 81225 416a32 81223->81225 81226 416a3d GetProcAddress 81223->81226 81231 416a16 81224->81231 81236 41177f Sleep GetModuleHandleW 81225->81236 81227 416a1a 81226->81227 81229 41130e 81227->81229 81230 416a4d RtlDecodePointer 81227->81230 81229->81136 81230->81229 81231->81223 81231->81227 81232 416a38 81232->81226 81232->81229 81233->81139 81234->81146 81235->81151 81236->81232 81240 41832d LeaveCriticalSection 81237->81240 81239 411420 81239->81129 81240->81239 81241->81069 81242->81081 81243 40116e 81244 401119 DefWindowProcW 81243->81244 81245 429212 81250 410b90 81245->81250 81248 411421 __cinit 76 API calls 81249 42922f 81248->81249 81251 410b9a __write_nolock 81250->81251 81252 41171a 77 API calls 81251->81252 81253 410c31 GetModuleFileNameW 81252->81253 81267 413db0 81253->81267 81255 410c66 _wcsncat 81270 413e3c 81255->81270 81258 41171a 77 API calls 81259 410ca3 _wcscpy 81258->81259 81260 410cd1 RegOpenKeyExW 81259->81260 81261 429bc3 RegQueryValueExW 81260->81261 81262 410cf7 81260->81262 81263 429cd9 RegCloseKey 81261->81263 81264 429bf2 _wcscat _wcslen _wcsncpy 81261->81264 81262->81248 81265 41171a 77 API calls 81264->81265 81266 429cd8 81264->81266 81265->81264 81266->81263 81273 413b95 81267->81273 81303 41abec 81270->81303 81274 413bae 81273->81274 81275 413c2f 81273->81275 81274->81275 81291 413c1d 81274->81291 81295 41ab19 69 API calls __wcstombs_s_l 81274->81295 81276 413d60 81275->81276 81277 413d7b 81275->81277 81299 417f23 69 API calls __getptd_noexit 81276->81299 81301 417f23 69 API calls __getptd_noexit 81277->81301 81280 413d65 81281 413cfb 81280->81281 81300 417ebb 7 API calls 2 library calls 81280->81300 81281->81255 81284 413d03 81284->81275 81284->81281 81287 413d8e 81284->81287 81285 413cb9 81285->81275 81286 413cd6 81285->81286 81297 41ab19 69 API calls __wcstombs_s_l 81285->81297 81286->81275 81286->81281 81290 413cef 81286->81290 81302 41ab19 69 API calls __wcstombs_s_l 81287->81302 81298 41ab19 69 API calls __wcstombs_s_l 81290->81298 81291->81275 81294 413c9b 81291->81294 81296 41ab19 69 API calls __wcstombs_s_l 81291->81296 81294->81284 81294->81285 81295->81291 81296->81294 81297->81286 81298->81281 81299->81280 81301->81280 81302->81281 81304 41ac02 81303->81304 81305 41abfd 81303->81305 81312 417f23 69 API calls __getptd_noexit 81304->81312 81305->81304 81308 41ac22 81305->81308 81307 41ac07 81313 417ebb 7 API calls 2 library calls 81307->81313 81311 410c99 81308->81311 81314 417f23 69 API calls __getptd_noexit 81308->81314 81311->81258 81312->81307 81314->81307 81315 401230 81316 401241 _memset 81315->81316 81317 4012c5 81315->81317 81330 401be0 81316->81330 81319 40126b 81320 4012ae KillTimer SetTimer 81319->81320 81321 42aa61 81319->81321 81322 401298 81319->81322 81320->81317 81325 42aa8b Shell_NotifyIconW 81321->81325 81326 42aa69 Shell_NotifyIconW 81321->81326 81323 4012a2 81322->81323 81324 42aaac 81322->81324 81323->81320 81327 42aaf8 Shell_NotifyIconW 81323->81327 81328 42aad7 Shell_NotifyIconW 81324->81328 81329 42aab5 Shell_NotifyIconW 81324->81329 81325->81320 81326->81320 81327->81320 81328->81320 81329->81320 81331 401bfb 81330->81331 81351 401cde 81330->81351 81352 4013a0 77 API calls 81331->81352 81333 401c0b 81334 42a9a0 LoadStringW 81333->81334 81335 401c18 81333->81335 81337 42a9bb 81334->81337 81353 4021e0 81335->81353 81339 40df50 77 API calls 81337->81339 81338 401c2d 81340 401c3a 81338->81340 81341 42a9cd 81338->81341 81342 401c53 _memset _wcscpy _wcsncpy 81339->81342 81340->81337 81343 401c44 81340->81343 81366 40d3b0 77 API calls 2 library calls 81341->81366 81350 401cc2 Shell_NotifyIconW 81342->81350 81365 40d3b0 77 API calls 2 library calls 81343->81365 81346 42a9dc 81346->81342 81347 42a9f0 81346->81347 81367 40d3b0 77 API calls 2 library calls 81347->81367 81349 42a9fe 81350->81351 81351->81319 81352->81333 81354 42a598 81353->81354 81355 4021f1 _wcslen 81353->81355 81370 40c740 81354->81370 81358 402205 81355->81358 81359 402226 81355->81359 81357 42a5a2 81368 404020 77 API calls moneypunct 81358->81368 81369 401380 77 API calls 81359->81369 81362 40220c _memcpy_s 81362->81338 81363 40222d 81363->81357 81364 41171a 77 API calls 81363->81364 81364->81362 81365->81342 81366->81346 81367->81349 81368->81362 81369->81363 81371 40c752 81370->81371 81372 40c747 81370->81372 81371->81357 81372->81371 81375 402ae0 77 API calls _memcpy_s 81372->81375 81374 42a572 _memcpy_s 81374->81357 81375->81374 81376 4034b0 81377 4034b9 81376->81377 81378 4034bd 81376->81378 81379 41171a 77 API calls 81378->81379 81380 42a0ba 81378->81380 81381 4034fe _memcpy_s moneypunct 81379->81381 81382 416193 81419 41718c 81382->81419 81384 41619f GetStartupInfoW 81386 4161c2 81384->81386 81420 41aa31 HeapCreate 81386->81420 81388 416212 81422 416e29 GetModuleHandleW 81388->81422 81393 416223 __RTC_Initialize 81456 41b669 81393->81456 81395 416231 81396 41623d GetCommandLineW 81395->81396 81525 4117af 69 API calls 3 library calls 81395->81525 81471 42235f GetEnvironmentStringsW 81396->81471 81399 41624c 81477 4222b1 GetModuleFileNameW 81399->81477 81400 41623c 81400->81396 81402 416256 81403 416261 81402->81403 81526 4117af 69 API calls 3 library calls 81402->81526 81481 422082 81403->81481 81407 416272 81494 41186e 81407->81494 81410 416279 81412 416284 __wwincmdln 81410->81412 81528 4117af 69 API calls 3 library calls 81410->81528 81500 40d7f0 81412->81500 81415 4162b3 81530 411a4b 69 API calls _doexit 81415->81530 81418 4162b8 __msize 81419->81384 81421 416206 81420->81421 81421->81388 81523 41616a 69 API calls 3 library calls 81421->81523 81423 416e44 81422->81423 81424 416e3d 81422->81424 81426 416fac 81423->81426 81427 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 81423->81427 81531 41177f Sleep GetModuleHandleW 81424->81531 81541 416ad5 72 API calls 2 library calls 81426->81541 81430 416e97 TlsAlloc 81427->81430 81429 416e43 81429->81423 81432 416218 81430->81432 81433 416ee5 TlsSetValue 81430->81433 81432->81393 81524 41616a 69 API calls 3 library calls 81432->81524 81433->81432 81434 416ef6 81433->81434 81532 411a69 7 API calls 3 library calls 81434->81532 81436 416efb 81437 41696e __encode_pointer 7 API calls 81436->81437 81438 416f06 81437->81438 81439 41696e __encode_pointer 7 API calls 81438->81439 81440 416f16 81439->81440 81441 41696e __encode_pointer 7 API calls 81440->81441 81442 416f26 81441->81442 81443 41696e __encode_pointer 7 API calls 81442->81443 81444 416f36 81443->81444 81533 41828b InitializeCriticalSectionAndSpinCount __ioinit 81444->81533 81446 416f43 81446->81426 81447 4169e9 __decode_pointer 7 API calls 81446->81447 81448 416f57 81447->81448 81448->81426 81534 416ffb 81448->81534 81451 4169e9 __decode_pointer 7 API calls 81452 416f8a 81451->81452 81452->81426 81453 416f91 81452->81453 81540 416b12 69 API calls 5 library calls 81453->81540 81455 416f99 GetCurrentThreadId 81455->81432 81560 41718c 81456->81560 81458 41b675 GetStartupInfoA 81459 416ffb __calloc_crt 69 API calls 81458->81459 81466 41b696 81459->81466 81460 41b8b4 __msize 81460->81395 81461 41b831 GetStdHandle 81465 41b7fb 81461->81465 81462 41b896 SetHandleCount 81462->81460 81463 416ffb __calloc_crt 69 API calls 81463->81466 81464 41b843 GetFileType 81464->81465 81465->81460 81465->81461 81465->81462 81465->81464 81562 4189e6 InitializeCriticalSectionAndSpinCount __msize 81465->81562 81466->81460 81466->81463 81466->81465 81467 41b77e 81466->81467 81467->81460 81467->81465 81468 41b7a7 GetFileType 81467->81468 81561 4189e6 InitializeCriticalSectionAndSpinCount __msize 81467->81561 81468->81467 81472 422370 81471->81472 81473 422374 81471->81473 81472->81399 81474 416fb6 __malloc_crt 69 API calls 81473->81474 81476 422395 _memcpy_s 81474->81476 81475 42239c FreeEnvironmentStringsW 81475->81399 81476->81475 81478 4222e6 _wparse_cmdline 81477->81478 81479 416fb6 __malloc_crt 69 API calls 81478->81479 81480 422329 _wparse_cmdline 81478->81480 81479->81480 81480->81402 81482 42209a _wcslen 81481->81482 81486 416267 81481->81486 81483 416ffb __calloc_crt 69 API calls 81482->81483 81489 4220be _wcslen 81483->81489 81484 422123 81485 413a88 ___freetlocinfo 69 API calls 81484->81485 81485->81486 81486->81407 81527 4117af 69 API calls 3 library calls 81486->81527 81487 416ffb __calloc_crt 69 API calls 81487->81489 81488 422149 81490 413a88 ___freetlocinfo 69 API calls 81488->81490 81489->81484 81489->81486 81489->81487 81489->81488 81492 422108 81489->81492 81563 426349 69 API calls __wcstombs_s_l 81489->81563 81490->81486 81492->81489 81564 417d93 10 API calls 3 library calls 81492->81564 81496 41187c __IsNonwritableInCurrentImage 81494->81496 81565 418486 81496->81565 81497 41189a __initterm_e 81498 411421 __cinit 76 API calls 81497->81498 81499 4118b9 __IsNonwritableInCurrentImage __initterm 81497->81499 81498->81499 81499->81410 81501 431bcb 81500->81501 81502 40d80c 81500->81502 81503 4092c0 VariantClear 81502->81503 81504 40d847 81503->81504 81569 40eb50 81504->81569 81507 40d877 81575 411ac6 81507->81575 81512 40d891 81585 40f370 KiUserCallbackDispatcher SystemParametersInfoW 81512->81585 81514 40d89f 81586 40d6d0 GetCurrentDirectoryW 81514->81586 81516 40d8a7 SystemParametersInfoW 81517 40d8d4 81516->81517 81518 40d8cd FreeLibrary 81516->81518 81519 4092c0 VariantClear 81517->81519 81518->81517 81520 40d8dd 81519->81520 81521 4092c0 VariantClear 81520->81521 81522 40d8e6 81521->81522 81522->81415 81529 411a1f 69 API calls _doexit 81522->81529 81523->81388 81524->81393 81525->81400 81526->81403 81527->81407 81528->81412 81529->81415 81530->81418 81531->81429 81532->81436 81533->81446 81536 417004 81534->81536 81537 416f70 81536->81537 81538 417022 Sleep 81536->81538 81542 422452 81536->81542 81537->81426 81537->81451 81539 417037 81538->81539 81539->81536 81539->81537 81540->81455 81541->81432 81543 42245e __msize 81542->81543 81544 422476 81543->81544 81554 422495 _memset 81543->81554 81555 417f23 69 API calls __getptd_noexit 81544->81555 81546 42247b 81556 417ebb 7 API calls 2 library calls 81546->81556 81548 422507 RtlAllocateHeap 81548->81554 81550 418407 __lock 68 API calls 81550->81554 81551 42248b __msize 81551->81536 81554->81548 81554->81550 81554->81551 81557 41a74c 5 API calls 2 library calls 81554->81557 81558 42254e LeaveCriticalSection _doexit 81554->81558 81559 411afc 7 API calls __decode_pointer 81554->81559 81555->81546 81557->81554 81558->81554 81559->81554 81560->81458 81561->81467 81562->81465 81563->81489 81564->81492 81566 41848c 81565->81566 81567 41696e __encode_pointer 7 API calls 81566->81567 81568 4184a4 81566->81568 81567->81566 81568->81497 81623 40eb70 81569->81623 81572 40eba0 81573 40eb50 2 API calls 81572->81573 81574 40eba5 81573->81574 81574->81507 81576 418407 __lock 69 API calls 81575->81576 81577 411ad3 81576->81577 81578 4169e9 __decode_pointer 7 API calls 81577->81578 81579 411ade 81578->81579 81580 41696e __encode_pointer 7 API calls 81579->81580 81581 411ae8 81580->81581 81627 41832d LeaveCriticalSection 81581->81627 81583 40d888 81584 411b24 69 API calls __wcstombs_s_l 81583->81584 81584->81512 81585->81514 81628 401f80 81586->81628 81588 40d6f1 IsDebuggerPresent 81589 431a9d MessageBoxA 81588->81589 81590 40d6ff 81588->81590 81591 431ab6 81589->81591 81590->81591 81592 40d71f 81590->81592 81721 403e90 77 API calls 3 library calls 81591->81721 81698 40f3b0 81592->81698 81596 40d73a GetFullPathNameW 81718 401440 129 API calls _wcscat 81596->81718 81598 40d77a 81599 40d782 81598->81599 81600 431b09 SetCurrentDirectoryW 81598->81600 81601 40d78b 81599->81601 81722 43604b 6 API calls 81599->81722 81600->81599 81710 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 81601->81710 81604 431b28 81604->81601 81606 431b30 GetModuleFileNameW 81604->81606 81608 431ba4 GetForegroundWindow ShellExecuteW 81606->81608 81609 431b4c 81606->81609 81611 40d7c7 81608->81611 81723 401b70 81609->81723 81610 40d795 81617 40d7a8 81610->81617 81719 40e1e0 99 API calls _memset 81610->81719 81615 40d7d1 SetCurrentDirectoryW 81611->81615 81615->81516 81617->81611 81720 401000 Shell_NotifyIconW _memset 81617->81720 81618 431b66 81730 40d3b0 77 API calls 2 library calls 81618->81730 81621 431b72 GetForegroundWindow ShellExecuteW 81622 431b9f 81621->81622 81622->81611 81624 40d86e 81623->81624 81625 40eb76 LoadLibraryA 81623->81625 81624->81507 81624->81572 81625->81624 81626 40eb87 GetProcAddress 81625->81626 81626->81624 81627->81583 81731 40e680 77 API calls 81628->81731 81630 401f90 81732 402940 77 API calls __write_nolock 81630->81732 81632 401fa2 GetModuleFileNameW 81733 40ff90 81632->81733 81634 401fbd 81745 4107b0 77 API calls 81634->81745 81636 401fd6 81637 401b70 77 API calls 81636->81637 81638 401fe4 81637->81638 81746 4019e0 78 API calls 81638->81746 81640 401ff2 81641 4092c0 VariantClear 81640->81641 81642 402002 81641->81642 81643 401b70 77 API calls 81642->81643 81644 40201c 81643->81644 81747 4019e0 78 API calls 81644->81747 81646 40202c 81647 401b70 77 API calls 81646->81647 81648 40203c 81647->81648 81748 40c3e0 81648->81748 81650 40204d 81766 40c060 81650->81766 81654 40206e 81772 4115d0 81 API calls 2 library calls 81654->81772 81656 40207d 81657 42c174 81656->81657 81658 402088 81656->81658 81783 401a70 77 API calls 81657->81783 81773 4115d0 81 API calls 2 library calls 81658->81773 81661 42c189 81784 401a70 77 API calls 81661->81784 81662 402093 81662->81661 81663 40209e 81662->81663 81774 4115d0 81 API calls 2 library calls 81663->81774 81666 42c1a7 81668 42c1b0 GetModuleFileNameW 81666->81668 81667 4020a9 81667->81668 81669 4020b4 81667->81669 81785 401a70 77 API calls 81668->81785 81775 4115d0 81 API calls 2 library calls 81669->81775 81672 42c1e2 81673 40df50 77 API calls 81672->81673 81675 42c1f1 81673->81675 81674 4020bf 81680 42c20a _wcscpy 81674->81680 81689 402107 81674->81689 81776 401a70 77 API calls 81674->81776 81786 401a70 77 API calls 81675->81786 81676 42c243 81677 402119 81677->81676 81778 40e7e0 78 API calls 81677->81778 81787 401a70 77 API calls 81680->81787 81682 4020e5 _wcscpy 81777 401a70 77 API calls 81682->81777 81683 42c201 81683->81680 81685 402132 81779 40d030 78 API calls 81685->81779 81687 40213e 81690 4092c0 VariantClear 81687->81690 81689->81677 81689->81680 81693 402148 81690->81693 81691 402184 81695 4092c0 VariantClear 81691->81695 81693->81691 81780 40d030 78 API calls 81693->81780 81781 40e640 78 API calls 81693->81781 81782 401a70 77 API calls 81693->81782 81697 402196 moneypunct 81695->81697 81697->81588 81699 40f3c9 81698->81699 81700 42ccf4 _memset 81698->81700 82457 40ffb0 78 API calls moneypunct 81699->82457 81702 42cd05 GetOpenFileNameW 81700->81702 81702->81699 81704 40d732 81702->81704 81703 40f3d2 82458 410130 SHGetMalloc 81703->82458 81704->81596 81704->81598 81706 40f3d9 82463 410020 90 API calls __wcsicoll 81706->82463 81708 40f3e7 82464 40f400 81708->82464 81711 42b9d3 81710->81711 81712 41025a LoadImageW RegisterClassExW 81710->81712 82504 443e8f EnumResourceNamesW LoadImageW 81711->82504 82503 4102f0 7 API calls 81712->82503 81715 40d790 81717 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 81715->81717 81716 42b9da 81717->81610 81718->81598 81719->81617 81720->81611 81721->81598 81722->81604 81724 401b76 _wcslen 81723->81724 81725 41171a 77 API calls 81724->81725 81728 401bc5 81724->81728 81726 401bad _memcpy_s 81725->81726 81727 41171a 77 API calls 81726->81727 81727->81728 81729 40d3b0 77 API calls 2 library calls 81728->81729 81729->81618 81730->81621 81731->81630 81732->81632 81788 40f5e0 81733->81788 81736 40ffa6 81736->81634 81738 42b6d8 81739 42b6e6 81738->81739 81844 434fe1 81738->81844 81740 413a88 ___freetlocinfo 69 API calls 81739->81740 81742 42b6f5 81740->81742 81743 434fe1 108 API calls 81742->81743 81744 42b702 81743->81744 81744->81634 81745->81636 81746->81640 81747->81646 81749 40c3e4 81748->81749 81750 40c42c 81748->81750 81751 40c3f0 81749->81751 81752 42a475 81749->81752 81753 42a422 81750->81753 81754 40c435 81750->81754 82447 4042f0 81751->82447 82456 453155 77 API calls 81752->82456 81756 42a427 81753->81756 81757 42a445 81753->81757 81758 40c441 81754->81758 81759 42a455 81754->81759 81765 40c3fb 81756->81765 82453 453155 77 API calls 81756->82453 82454 453155 77 API calls 81757->82454 81760 4042f0 77 API calls 81758->81760 82455 453155 77 API calls 81759->82455 81760->81765 81765->81650 81767 41171a 77 API calls 81766->81767 81768 40c088 81767->81768 81769 41171a 77 API calls 81768->81769 81770 402061 81769->81770 81771 401a70 77 API calls 81770->81771 81771->81654 81772->81656 81773->81662 81774->81667 81775->81674 81776->81682 81777->81689 81778->81685 81779->81687 81780->81693 81781->81693 81782->81693 81783->81661 81784->81666 81785->81672 81786->81683 81787->81693 81848 40f580 81788->81848 81790 40f5f8 _strcat moneypunct 81856 40f6d0 81790->81856 81795 42b2ee 81885 4151b0 81795->81885 81797 40f679 81797->81795 81798 40f681 81797->81798 81872 414e94 81798->81872 81802 40f68b 81802->81736 81807 452574 81802->81807 81804 42b31d 81891 415484 81804->81891 81806 42b33d 81808 41557c _fseek 107 API calls 81807->81808 81809 4525df 81808->81809 82392 4523ce 81809->82392 81812 4525fc 81812->81738 81813 4151b0 __fread_nolock 83 API calls 81814 45261d 81813->81814 81815 4151b0 __fread_nolock 83 API calls 81814->81815 81816 45262e 81815->81816 81817 4151b0 __fread_nolock 83 API calls 81816->81817 81818 452649 81817->81818 81819 4151b0 __fread_nolock 83 API calls 81818->81819 81820 452666 81819->81820 81821 41557c _fseek 107 API calls 81820->81821 81822 452682 81821->81822 81823 4138ba _malloc 69 API calls 81822->81823 81824 45268e 81823->81824 81825 4138ba _malloc 69 API calls 81824->81825 81826 45269b 81825->81826 81827 4151b0 __fread_nolock 83 API calls 81826->81827 81828 4526ac 81827->81828 81829 44afdc GetSystemTimeAsFileTime 81828->81829 81830 4526bf 81829->81830 81831 4526d5 81830->81831 81832 4526fd 81830->81832 81833 413a88 ___freetlocinfo 69 API calls 81831->81833 81834 452704 81832->81834 81835 45275b 81832->81835 81836 4526df 81833->81836 82398 44b195 81834->82398 81838 413a88 ___freetlocinfo 69 API calls 81835->81838 81839 413a88 ___freetlocinfo 69 API calls 81836->81839 81841 452759 81838->81841 81842 4526e8 81839->81842 81840 452753 81843 413a88 ___freetlocinfo 69 API calls 81840->81843 81841->81738 81842->81738 81843->81841 81845 434ff1 81844->81845 81846 434feb 81844->81846 81845->81739 81847 414e94 __fcloseall 108 API calls 81846->81847 81847->81845 81849 429440 81848->81849 81850 40f589 _wcslen 81848->81850 81851 40f58f WideCharToMultiByte 81850->81851 81852 40f5d8 81851->81852 81853 40f5ad 81851->81853 81852->81790 81854 41171a 77 API calls 81853->81854 81855 40f5bb WideCharToMultiByte 81854->81855 81855->81790 81857 40f6dd _strlen 81856->81857 81904 40f790 81857->81904 81860 414e06 81923 414d40 81860->81923 81862 40f666 81862->81795 81863 40f450 81862->81863 81867 40f45a _strcat _memcpy_s __write_nolock 81863->81867 81864 4151b0 __fread_nolock 83 API calls 81864->81867 81865 40f531 81865->81797 81867->81864 81867->81865 81868 42936d 81867->81868 82006 41557c 81867->82006 81869 41557c _fseek 107 API calls 81868->81869 81870 429394 81869->81870 81871 4151b0 __fread_nolock 83 API calls 81870->81871 81871->81865 81873 414ea0 __msize 81872->81873 81874 414ed1 81873->81874 81875 414eb4 81873->81875 81878 415965 __lock_file 70 API calls 81874->81878 81881 414ec9 __msize 81874->81881 82145 417f23 69 API calls __getptd_noexit 81875->82145 81877 414eb9 82146 417ebb 7 API calls 2 library calls 81877->82146 81880 414ee9 81878->81880 82129 414e1d 81880->82129 81881->81802 82214 41511a 81885->82214 81887 4151c8 81888 44afdc 81887->81888 82385 4431e0 81888->82385 81890 44affd 81890->81804 81892 415490 __msize 81891->81892 81893 4154bb 81892->81893 81894 41549e 81892->81894 81896 415965 __lock_file 70 API calls 81893->81896 82389 417f23 69 API calls __getptd_noexit 81894->82389 81898 4154c3 81896->81898 81897 4154a3 82390 417ebb 7 API calls 2 library calls 81897->82390 81900 4152e7 __ftell_nolock 73 API calls 81898->81900 81901 4154cf 81900->81901 82391 4154e8 LeaveCriticalSection LeaveCriticalSection __wfsopen 81901->82391 81903 4154b3 __msize 81903->81806 81905 40f7ae _memset 81904->81905 81907 40f628 81905->81907 81908 415258 81905->81908 81907->81860 81909 415285 81908->81909 81910 415268 81908->81910 81909->81910 81912 41528c 81909->81912 81919 417f23 69 API calls __getptd_noexit 81910->81919 81921 41c551 105 API calls 14 library calls 81912->81921 81913 41526d 81920 417ebb 7 API calls 2 library calls 81913->81920 81916 4152b2 81917 41527d 81916->81917 81922 4191c9 103 API calls 6 library calls 81916->81922 81917->81905 81919->81913 81921->81916 81922->81917 81924 414d4c __msize 81923->81924 81925 414d5f 81924->81925 81927 414d95 81924->81927 81975 417f23 69 API calls __getptd_noexit 81925->81975 81942 41e28c 81927->81942 81928 414d64 81976 417ebb 7 API calls 2 library calls 81928->81976 81931 414d9a 81932 414da1 81931->81932 81933 414dae 81931->81933 81977 417f23 69 API calls __getptd_noexit 81932->81977 81935 414dd6 81933->81935 81936 414db6 81933->81936 81960 41dfd8 81935->81960 81978 417f23 69 API calls __getptd_noexit 81936->81978 81939 414d74 __msize @_EH4_CallFilterFunc@8 81939->81862 81943 41e298 __msize 81942->81943 81944 418407 __lock 69 API calls 81943->81944 81950 41e2a6 81944->81950 81945 41e322 81946 416fb6 __malloc_crt 69 API calls 81945->81946 81948 41e32c 81946->81948 81959 41e31b 81948->81959 81985 4189e6 InitializeCriticalSectionAndSpinCount __msize 81948->81985 81949 41e3b0 __msize 81949->81931 81950->81945 81952 418344 __mtinitlocknum 69 API calls 81950->81952 81950->81959 81983 4159a6 70 API calls __lock 81950->81983 81984 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 81950->81984 81952->81950 81954 41e351 81955 41e35c 81954->81955 81956 41e36f EnterCriticalSection 81954->81956 81957 413a88 ___freetlocinfo 69 API calls 81955->81957 81956->81959 81957->81959 81980 41e3bb 81959->81980 81967 41dffb __wopenfile 81960->81967 81961 41e015 81990 417f23 69 API calls __getptd_noexit 81961->81990 81963 41e01a 81991 417ebb 7 API calls 2 library calls 81963->81991 81965 41e247 81987 425db0 81965->81987 81967->81961 81974 41e1e9 81967->81974 81992 4136bc 81 API calls 2 library calls 81967->81992 81970 41e1e2 81970->81974 81993 4136bc 81 API calls 2 library calls 81970->81993 81972 41e201 81972->81974 81994 4136bc 81 API calls 2 library calls 81972->81994 81974->81961 81974->81965 81975->81928 81977->81939 81978->81939 81979 414dfc LeaveCriticalSection LeaveCriticalSection __wfsopen 81979->81939 81986 41832d LeaveCriticalSection 81980->81986 81982 41e3c2 81982->81949 81983->81950 81984->81950 81985->81954 81986->81982 81995 425ce4 81987->81995 81989 414de1 81989->81979 81990->81963 81992->81970 81993->81972 81994->81974 81998 425cf0 __msize 81995->81998 81996 425d03 81997 417f23 __wcstombs_s_l 69 API calls 81996->81997 81999 425d08 81997->81999 81998->81996 82000 425d41 81998->82000 82001 417ebb __wcstombs_s_l 7 API calls 81999->82001 82002 4255c4 __tsopen_nolock 134 API calls 82000->82002 82005 425d17 __msize 82001->82005 82003 425d5b 82002->82003 82004 425d82 __sopen_helper LeaveCriticalSection 82003->82004 82004->82005 82005->81989 82010 415588 __msize 82006->82010 82007 415596 82037 417f23 69 API calls __getptd_noexit 82007->82037 82009 4155c4 82019 415965 82009->82019 82010->82007 82010->82009 82011 41559b 82038 417ebb 7 API calls 2 library calls 82011->82038 82018 4155ab __msize 82018->81867 82020 415977 82019->82020 82021 415999 EnterCriticalSection 82019->82021 82020->82021 82022 41597f 82020->82022 82023 4155cc 82021->82023 82024 418407 __lock 69 API calls 82022->82024 82025 4154f2 82023->82025 82024->82023 82026 415512 82025->82026 82027 415502 82025->82027 82028 415524 82026->82028 82040 4152e7 82026->82040 82094 417f23 69 API calls __getptd_noexit 82027->82094 82057 41486c 82028->82057 82030 415507 82039 4155f7 LeaveCriticalSection LeaveCriticalSection __wfsopen 82030->82039 82037->82011 82039->82018 82041 41531a 82040->82041 82042 4152fa 82040->82042 82043 41453a __fileno 69 API calls 82041->82043 82095 417f23 69 API calls __getptd_noexit 82042->82095 82045 415320 82043->82045 82048 41efd4 __locking 73 API calls 82045->82048 82046 4152ff 82096 417ebb 7 API calls 2 library calls 82046->82096 82049 415335 82048->82049 82050 4153a9 82049->82050 82052 415364 82049->82052 82056 41530f 82049->82056 82097 417f23 69 API calls __getptd_noexit 82050->82097 82053 41efd4 __locking 73 API calls 82052->82053 82052->82056 82054 415404 82053->82054 82055 41efd4 __locking 73 API calls 82054->82055 82054->82056 82055->82056 82056->82028 82058 4148a7 82057->82058 82059 414885 82057->82059 82063 41453a 82058->82063 82059->82058 82060 41453a __fileno 69 API calls 82059->82060 82061 4148a0 82060->82061 82098 41c3cf 103 API calls 6 library calls 82061->82098 82064 414549 82063->82064 82068 41455e 82063->82068 82099 417f23 69 API calls __getptd_noexit 82064->82099 82066 41454e 82100 417ebb 7 API calls 2 library calls 82066->82100 82069 41efd4 82068->82069 82070 41efe0 __msize 82069->82070 82071 41efe8 82070->82071 82074 41f003 82070->82074 82121 417f36 69 API calls __getptd_noexit 82071->82121 82073 41f011 82123 417f36 69 API calls __getptd_noexit 82073->82123 82074->82073 82077 41f052 82074->82077 82075 41efed 82122 417f23 69 API calls __getptd_noexit 82075->82122 82101 41ba3b 82077->82101 82079 41f016 82124 417f23 69 API calls __getptd_noexit 82079->82124 82082 41f058 82085 41f065 82082->82085 82086 41f07b 82082->82086 82083 41f01d 82125 417ebb 7 API calls 2 library calls 82083->82125 82111 41ef5f 82085->82111 82126 417f23 69 API calls __getptd_noexit 82086->82126 82087 41eff5 __msize 82087->82030 82090 41f073 82128 41f0a6 LeaveCriticalSection __unlock_fhandle 82090->82128 82091 41f080 82127 417f36 69 API calls __getptd_noexit 82091->82127 82094->82030 82095->82046 82097->82056 82098->82058 82099->82066 82102 41ba47 __msize 82101->82102 82103 41baa2 82102->82103 82106 418407 __lock 69 API calls 82102->82106 82104 41bac4 __msize 82103->82104 82105 41baa7 EnterCriticalSection 82103->82105 82104->82082 82105->82104 82107 41ba73 82106->82107 82109 4189e6 __ioinit InitializeCriticalSectionAndSpinCount 82107->82109 82110 41ba8a 82107->82110 82108 41bad2 ___lock_fhandle LeaveCriticalSection 82108->82103 82109->82110 82110->82108 82112 41b9c4 __lseek_nolock 69 API calls 82111->82112 82113 41ef6e 82112->82113 82114 41ef84 SetFilePointer 82113->82114 82115 41ef74 82113->82115 82117 41efa3 82114->82117 82118 41ef9b GetLastError 82114->82118 82116 417f23 __wcstombs_s_l 69 API calls 82115->82116 82119 41ef79 82116->82119 82117->82119 82120 417f49 __dosmaperr 69 API calls 82117->82120 82118->82117 82119->82090 82120->82119 82121->82075 82122->82087 82123->82079 82124->82083 82126->82091 82127->82090 82128->82087 82130 414e31 82129->82130 82131 414e4d 82129->82131 82175 417f23 69 API calls __getptd_noexit 82130->82175 82134 41486c __flush 103 API calls 82131->82134 82138 414e46 82131->82138 82133 414e36 82176 417ebb 7 API calls 2 library calls 82133->82176 82135 414e59 82134->82135 82148 41e680 82135->82148 82147 414f08 LeaveCriticalSection LeaveCriticalSection __wfsopen 82138->82147 82140 41453a __fileno 69 API calls 82141 414e67 82140->82141 82152 41e5b3 82141->82152 82143 414e6d 82143->82138 82144 413a88 ___freetlocinfo 69 API calls 82143->82144 82144->82138 82145->81877 82147->81881 82149 41e690 82148->82149 82150 414e61 82148->82150 82149->82150 82151 413a88 ___freetlocinfo 69 API calls 82149->82151 82150->82140 82151->82150 82153 41e5bf __msize 82152->82153 82154 41e5e2 82153->82154 82155 41e5c7 82153->82155 82156 41e5f0 82154->82156 82161 41e631 82154->82161 82192 417f36 69 API calls __getptd_noexit 82155->82192 82194 417f36 69 API calls __getptd_noexit 82156->82194 82159 41e5cc 82193 417f23 69 API calls __getptd_noexit 82159->82193 82160 41e5f5 82195 417f23 69 API calls __getptd_noexit 82160->82195 82164 41ba3b ___lock_fhandle 70 API calls 82161->82164 82166 41e637 82164->82166 82165 41e5fc 82196 417ebb 7 API calls 2 library calls 82165->82196 82168 41e652 82166->82168 82169 41e644 82166->82169 82197 417f23 69 API calls __getptd_noexit 82168->82197 82177 41e517 82169->82177 82172 41e64c 82198 41e676 LeaveCriticalSection __unlock_fhandle 82172->82198 82173 41e5d4 __msize 82173->82143 82175->82133 82199 41b9c4 82177->82199 82179 41e57d 82212 41b93e 70 API calls 2 library calls 82179->82212 82180 41e527 82180->82179 82182 41b9c4 __lseek_nolock 69 API calls 82180->82182 82191 41e55b 82180->82191 82185 41e552 82182->82185 82183 41b9c4 __lseek_nolock 69 API calls 82186 41e567 CloseHandle 82183->82186 82184 41e585 82187 41e5a7 82184->82187 82213 417f49 69 API calls 3 library calls 82184->82213 82189 41b9c4 __lseek_nolock 69 API calls 82185->82189 82186->82179 82190 41e573 GetLastError 82186->82190 82187->82172 82189->82191 82190->82179 82191->82179 82191->82183 82192->82159 82193->82173 82194->82160 82195->82165 82197->82172 82198->82173 82200 41b9d1 82199->82200 82202 41b9e9 82199->82202 82201 417f36 __tsopen_nolock 69 API calls 82200->82201 82203 41b9d6 82201->82203 82204 417f36 __tsopen_nolock 69 API calls 82202->82204 82206 41ba2e 82202->82206 82205 417f23 __wcstombs_s_l 69 API calls 82203->82205 82207 41ba17 82204->82207 82209 41b9de 82205->82209 82206->82180 82208 417f23 __wcstombs_s_l 69 API calls 82207->82208 82210 41ba1e 82208->82210 82209->82180 82211 417ebb __wcstombs_s_l 7 API calls 82210->82211 82211->82206 82212->82184 82213->82187 82215 415126 __msize 82214->82215 82216 41513a _memset 82215->82216 82217 41516f 82215->82217 82218 415164 __msize 82215->82218 82243 417f23 69 API calls __getptd_noexit 82216->82243 82219 415965 __lock_file 70 API calls 82217->82219 82218->81887 82220 415177 82219->82220 82227 414f10 82220->82227 82223 415154 82244 417ebb 7 API calls 2 library calls 82223->82244 82228 414f2e _memset 82227->82228 82233 414f4c 82227->82233 82229 414f37 82228->82229 82228->82233 82235 414f8b 82228->82235 82296 417f23 69 API calls __getptd_noexit 82229->82296 82231 414f3c 82297 417ebb 7 API calls 2 library calls 82231->82297 82245 4151a6 LeaveCriticalSection LeaveCriticalSection __wfsopen 82233->82245 82235->82233 82236 4150d5 _memset 82235->82236 82237 4150a9 _memset 82235->82237 82238 41453a __fileno 69 API calls 82235->82238 82246 41ed9e 82235->82246 82276 41e6b1 82235->82276 82298 41ee9b 69 API calls 3 library calls 82235->82298 82300 417f23 69 API calls __getptd_noexit 82236->82300 82299 417f23 69 API calls __getptd_noexit 82237->82299 82238->82235 82243->82223 82245->82218 82247 41edaa __msize 82246->82247 82248 41edb2 82247->82248 82249 41edcd 82247->82249 82370 417f36 69 API calls __getptd_noexit 82248->82370 82251 41eddb 82249->82251 82254 41ee1c 82249->82254 82372 417f36 69 API calls __getptd_noexit 82251->82372 82252 41edb7 82371 417f23 69 API calls __getptd_noexit 82252->82371 82258 41ee29 82254->82258 82259 41ee3d 82254->82259 82256 41ede0 82373 417f23 69 API calls __getptd_noexit 82256->82373 82375 417f36 69 API calls __getptd_noexit 82258->82375 82262 41ba3b ___lock_fhandle 70 API calls 82259->82262 82260 41ede7 82374 417ebb 7 API calls 2 library calls 82260->82374 82264 41ee43 82262->82264 82263 41ee2e 82376 417f23 69 API calls __getptd_noexit 82263->82376 82268 41ee50 82264->82268 82269 41ee66 82264->82269 82267 41edbf __msize 82267->82235 82301 41e7dc 82268->82301 82377 417f23 69 API calls __getptd_noexit 82269->82377 82272 41ee5e 82379 41ee91 LeaveCriticalSection __unlock_fhandle 82272->82379 82273 41ee6b 82378 417f36 69 API calls __getptd_noexit 82273->82378 82277 41e6c1 82276->82277 82281 41e6de 82276->82281 82383 417f23 69 API calls __getptd_noexit 82277->82383 82279 41e6c6 82384 417ebb 7 API calls 2 library calls 82279->82384 82282 41e713 82281->82282 82288 41e6d6 82281->82288 82380 423600 82281->82380 82284 41453a __fileno 69 API calls 82282->82284 82285 41e727 82284->82285 82286 41ed9e __read 81 API calls 82285->82286 82287 41e72e 82286->82287 82287->82288 82289 41453a __fileno 69 API calls 82287->82289 82288->82235 82290 41e751 82289->82290 82290->82288 82291 41453a __fileno 69 API calls 82290->82291 82292 41e75d 82291->82292 82292->82288 82293 41453a __fileno 69 API calls 82292->82293 82294 41e769 82293->82294 82295 41453a __fileno 69 API calls 82294->82295 82295->82288 82296->82231 82298->82235 82299->82231 82300->82231 82302 41e813 82301->82302 82303 41e7f8 82301->82303 82304 41e822 82302->82304 82306 41e849 82302->82306 82305 417f36 __tsopen_nolock 69 API calls 82303->82305 82307 417f36 __tsopen_nolock 69 API calls 82304->82307 82308 41e7fd 82305->82308 82310 41e868 82306->82310 82321 41e87c 82306->82321 82309 41e827 82307->82309 82311 417f23 __wcstombs_s_l 69 API calls 82308->82311 82312 417f23 __wcstombs_s_l 69 API calls 82309->82312 82313 417f36 __tsopen_nolock 69 API calls 82310->82313 82322 41e805 82311->82322 82315 41e82e 82312->82315 82317 41e86d 82313->82317 82314 41e8d4 82316 417f36 __tsopen_nolock 69 API calls 82314->82316 82318 417ebb __wcstombs_s_l 7 API calls 82315->82318 82319 41e8d9 82316->82319 82320 417f23 __wcstombs_s_l 69 API calls 82317->82320 82318->82322 82323 417f23 __wcstombs_s_l 69 API calls 82319->82323 82324 41e874 82320->82324 82321->82314 82321->82322 82325 41e8b0 82321->82325 82326 41e8f5 82321->82326 82322->82272 82323->82324 82327 417ebb __wcstombs_s_l 7 API calls 82324->82327 82325->82314 82330 41e8bb ReadFile 82325->82330 82328 416fb6 __malloc_crt 69 API calls 82326->82328 82327->82322 82331 41e90b 82328->82331 82332 41ed62 GetLastError 82330->82332 82333 41e9e7 82330->82333 82336 41e931 82331->82336 82337 41e913 82331->82337 82334 41ebe8 82332->82334 82335 41ed6f 82332->82335 82333->82332 82340 41e9fb 82333->82340 82344 417f49 __dosmaperr 69 API calls 82334->82344 82349 41eb6d 82334->82349 82338 417f23 __wcstombs_s_l 69 API calls 82335->82338 82341 423462 __lseeki64_nolock 71 API calls 82336->82341 82339 417f23 __wcstombs_s_l 69 API calls 82337->82339 82342 41ed74 82338->82342 82343 41e918 82339->82343 82340->82349 82350 41ea17 82340->82350 82353 41ec2d 82340->82353 82345 41e93d 82341->82345 82346 417f36 __tsopen_nolock 69 API calls 82342->82346 82347 417f36 __tsopen_nolock 69 API calls 82343->82347 82344->82349 82345->82330 82346->82349 82347->82322 82348 413a88 ___freetlocinfo 69 API calls 82348->82322 82349->82322 82349->82348 82351 41ea7d ReadFile 82350->82351 82358 41eafa 82350->82358 82355 41ea9b GetLastError 82351->82355 82361 41eaa5 82351->82361 82352 41eca5 ReadFile 82356 41ecc4 GetLastError 82352->82356 82362 41ecce 82352->82362 82353->82349 82353->82352 82354 41ebbe MultiByteToWideChar 82354->82349 82357 41ebe2 GetLastError 82354->82357 82355->82350 82355->82361 82356->82353 82356->82362 82357->82334 82358->82349 82359 41eb75 82358->82359 82360 41eb68 82358->82360 82366 41eb32 82358->82366 82359->82366 82367 41ebac 82359->82367 82363 417f23 __wcstombs_s_l 69 API calls 82360->82363 82361->82350 82364 423462 __lseeki64_nolock 71 API calls 82361->82364 82362->82353 82365 423462 __lseeki64_nolock 71 API calls 82362->82365 82363->82349 82364->82361 82365->82362 82366->82354 82368 423462 __lseeki64_nolock 71 API calls 82367->82368 82369 41ebbb 82368->82369 82369->82354 82370->82252 82371->82267 82372->82256 82373->82260 82375->82263 82376->82260 82377->82273 82378->82272 82379->82267 82381 416fb6 __malloc_crt 69 API calls 82380->82381 82382 423615 82381->82382 82382->82282 82383->82279 82388 414cef GetSystemTimeAsFileTime __aulldiv 82385->82388 82387 4431ef 82387->81890 82388->82387 82389->81897 82391->81903 82395 4523e1 _wcscpy 82392->82395 82393 44afdc GetSystemTimeAsFileTime 82393->82395 82394 452553 82394->81812 82394->81813 82395->82393 82395->82394 82396 4151b0 83 API calls __fread_nolock 82395->82396 82397 41557c 107 API calls _fseek 82395->82397 82396->82395 82397->82395 82399 44b1b4 82398->82399 82400 44b1a6 82398->82400 82402 44b1ca 82399->82402 82403 44b1c2 82399->82403 82404 414e06 140 API calls 82399->82404 82401 414e06 140 API calls 82400->82401 82401->82399 82433 4352d1 83 API calls 2 library calls 82402->82433 82403->81840 82406 44b2c1 82404->82406 82406->82402 82408 44b2cf 82406->82408 82407 44b20d 82409 44b211 82407->82409 82410 44b23b 82407->82410 82411 44b2dc 82408->82411 82414 414e94 __fcloseall 108 API calls 82408->82414 82413 44b21e 82409->82413 82416 414e94 __fcloseall 108 API calls 82409->82416 82434 43526e 82410->82434 82411->81840 82417 44b22e 82413->82417 82420 414e94 __fcloseall 108 API calls 82413->82420 82414->82411 82415 44b242 82418 44b270 82415->82418 82419 44b248 82415->82419 82416->82413 82417->81840 82444 44b0af 113 API calls 82418->82444 82421 44b255 82419->82421 82423 414e94 __fcloseall 108 API calls 82419->82423 82420->82417 82424 44b265 82421->82424 82426 414e94 __fcloseall 108 API calls 82421->82426 82423->82421 82424->81840 82425 44b276 82445 43522c 69 API calls ___freetlocinfo 82425->82445 82426->82424 82428 44b27c 82429 44b289 82428->82429 82430 414e94 __fcloseall 108 API calls 82428->82430 82431 44b299 82429->82431 82432 414e94 __fcloseall 108 API calls 82429->82432 82430->82429 82431->81840 82432->82431 82433->82407 82435 4138ba _malloc 69 API calls 82434->82435 82436 43527d 82435->82436 82437 4138ba _malloc 69 API calls 82436->82437 82438 43528d 82437->82438 82439 4138ba _malloc 69 API calls 82438->82439 82440 43529d 82439->82440 82442 4352bc 82440->82442 82446 43522c 69 API calls ___freetlocinfo 82440->82446 82442->82415 82443 4352c8 82443->82415 82444->82425 82445->82428 82446->82443 82448 404304 82447->82448 82452 40431c 82447->82452 82449 40c060 77 API calls 82448->82449 82448->82452 82450 404561 82449->82450 82451 411421 __cinit 76 API calls 82450->82451 82451->82452 82452->81765 82453->81765 82454->81759 82455->81765 82456->81765 82457->81703 82459 410148 SHGetDesktopFolder 82458->82459 82462 4101a3 _wcscpy 82458->82462 82460 41015a _wcscpy 82459->82460 82459->82462 82461 41018a SHGetPathFromIDListW 82460->82461 82460->82462 82461->82462 82462->81706 82463->81708 82465 40f5e0 154 API calls 82464->82465 82466 40f417 82465->82466 82467 42ca37 82466->82467 82469 40f42c 82466->82469 82470 42ca1f 82466->82470 82468 452574 142 API calls 82467->82468 82472 42ca50 82468->82472 82495 4037e0 141 API calls 7 library calls 82469->82495 82496 43717f 112 API calls _printf 82470->82496 82476 42ca76 82472->82476 82477 42ca54 82472->82477 82474 40f446 82474->81704 82475 42ca2d 82475->82467 82479 41171a 77 API calls 82476->82479 82478 434fe1 108 API calls 82477->82478 82480 42ca5e 82478->82480 82487 42cacc moneypunct 82479->82487 82497 43717f 112 API calls _printf 82480->82497 82482 42ccc3 82484 413a88 ___freetlocinfo 69 API calls 82482->82484 82483 42ca6c 82483->82476 82485 42cccd 82484->82485 82486 434fe1 108 API calls 82485->82486 82488 42ccda 82486->82488 82487->82482 82492 401b70 77 API calls 82487->82492 82498 445051 77 API calls _memcpy_s 82487->82498 82499 44c80c 89 API calls 3 library calls 82487->82499 82500 44b408 77 API calls 82487->82500 82501 402cc0 77 API calls 2 library calls 82487->82501 82502 4026a0 77 API calls moneypunct 82487->82502 82492->82487 82495->82474 82496->82475 82497->82483 82498->82487 82499->82487 82500->82487 82501->82487 82502->82487 82503->81715 82504->81716 82505 431914 82506 431920 82505->82506 82507 431928 82506->82507 82508 43193d 82506->82508 82769 45e62e 118 API calls 3 library calls 82507->82769 82770 47f2b4 176 API calls 82508->82770 82511 43194a 82548 4095b0 moneypunct 82511->82548 82771 45e62e 118 API calls 3 library calls 82511->82771 82512 409708 82515 4097af 82515->82512 82756 40d590 VariantClear 82515->82756 82516 409894 82530 431673 CloseHandle 82516->82530 82531 43170c GetExitCodeProcess CloseHandle 82516->82531 82532 40d590 VariantClear 82516->82532 82534 46dd22 135 API calls 82516->82534 82536 46e641 136 API calls 82516->82536 82538 431781 Sleep 82516->82538 82547 4092c0 VariantClear 82516->82547 82516->82548 82757 447e59 77 API calls 82516->82757 82758 453b07 79 API calls 82516->82758 82759 4646a2 78 API calls 82516->82759 82761 444233 90 API calls _wcslen 82516->82761 82762 457509 VariantClear 82516->82762 82763 404120 82516->82763 82767 4717e3 VariantClear 82516->82767 82768 436272 6 API calls 82516->82768 82518 4315b8 WaitForSingleObject 82520 4315d6 GetExitCodeProcess CloseHandle 82518->82520 82518->82548 82760 40d590 VariantClear 82520->82760 82521 431623 Sleep 82521->82516 82524 43163b timeGetTime 82521->82524 82524->82516 82527 40986e Sleep 82527->82516 82529 409880 timeGetTime 82527->82529 82528 4098f1 TranslateMessage DispatchMessageW 82528->82548 82529->82516 82530->82516 82531->82516 82532->82516 82534->82516 82536->82516 82538->82548 82545 45e62e 118 API calls 82545->82548 82546 4319c9 VariantClear 82546->82548 82547->82516 82548->82512 82548->82515 82548->82516 82548->82518 82548->82521 82548->82527 82548->82528 82548->82545 82548->82546 82549 4092c0 VariantClear 82548->82549 82551 40b380 82548->82551 82575 409340 82548->82575 82608 409030 82548->82608 82622 40d300 82548->82622 82627 40d320 82548->82627 82633 409a40 82548->82633 82772 40e380 VariantClear moneypunct 82548->82772 82549->82548 82552 40b3a5 82551->82552 82553 40b53d 82551->82553 82554 430a99 82552->82554 82560 40b3b6 82552->82560 82773 45e62e 118 API calls 3 library calls 82553->82773 82774 45e62e 118 API calls 3 library calls 82554->82774 82557 40b528 82557->82548 82558 430aae 82563 4092c0 VariantClear 82558->82563 82560->82558 82562 40b3f2 82560->82562 82574 40b4fd moneypunct 82560->82574 82561 430dc9 82561->82561 82565 40b429 82562->82565 82566 430ae9 VariantClear 82562->82566 82572 40b476 moneypunct 82562->82572 82563->82557 82564 40b4eb 82564->82574 82776 40e380 VariantClear moneypunct 82564->82776 82573 40b43b moneypunct 82565->82573 82775 40e380 VariantClear moneypunct 82565->82775 82566->82573 82567 430d41 VariantClear 82567->82574 82569 430d08 moneypunct 82569->82567 82569->82574 82571 41171a 77 API calls 82571->82572 82572->82564 82572->82569 82573->82571 82573->82572 82574->82557 82777 45e62e 118 API calls 3 library calls 82574->82777 82576 409386 82575->82576 82582 409395 82575->82582 82577 4042f0 77 API calls 82576->82577 82577->82582 82579 42fba9 82781 45e62e 118 API calls 3 library calls 82579->82781 82581 42fc07 82783 45e62e 118 API calls 3 library calls 82581->82783 82582->82579 82582->82581 82584 42fc85 82582->82584 82586 42fcd8 82582->82586 82588 42fd4f 82582->82588 82593 42fd39 82582->82593 82594 40946f 82582->82594 82599 40947b 82582->82599 82601 4094c1 82582->82601 82603 4092c0 VariantClear 82582->82603 82607 409484 moneypunct 82582->82607 82780 453155 77 API calls 82582->82780 82782 40c620 120 API calls 82582->82782 82784 45e62e 118 API calls 3 library calls 82582->82784 82785 4781ae 142 API calls 82584->82785 82787 47f2b4 176 API calls 82586->82787 82590 4092c0 VariantClear 82588->82590 82590->82607 82591 42fc9c 82591->82607 82786 45e62e 118 API calls 3 library calls 82591->82786 82789 45e62e 118 API calls 3 library calls 82593->82789 82778 409210 VariantClear 82594->82778 82595 42fce9 82595->82607 82788 45e62e 118 API calls 3 library calls 82595->82788 82602 4092c0 VariantClear 82599->82602 82601->82607 82779 404260 78 API calls 82601->82779 82602->82607 82603->82582 82605 4094e1 82606 4092c0 VariantClear 82605->82606 82606->82607 82607->82548 82790 409110 119 API calls 82608->82790 82610 42ceb6 82800 410ae0 VariantClear moneypunct 82610->82800 82612 42cebf 82613 40906e 82613->82610 82614 42cea9 82613->82614 82616 4090a4 82613->82616 82799 45e62e 118 API calls 3 library calls 82614->82799 82791 404160 82616->82791 82619 4090f0 moneypunct 82619->82548 82620 4092c0 VariantClear 82621 4090be moneypunct 82620->82621 82621->82619 82621->82620 82623 4292e3 82622->82623 82624 40d30c 82622->82624 82625 429323 82623->82625 82626 4292fd TranslateAcceleratorW 82623->82626 82624->82548 82625->82548 82626->82624 82628 4296d0 82627->82628 82631 40d32f 82627->82631 82628->82548 82629 42972a IsDialogMessageW 82630 40d33c 82629->82630 82629->82631 82630->82548 82631->82629 82631->82630 82938 4340ec GetClassLongW 82631->82938 82634 409a66 _wcslen 82633->82634 82635 41171a 77 API calls 82634->82635 82696 40aade _memcpy_s moneypunct 82634->82696 82636 409a9c _memcpy_s 82635->82636 82638 41171a 77 API calls 82636->82638 82640 409abd 82638->82640 82639 42cee9 82642 41171a 77 API calls 82639->82642 82641 409aeb CharUpperBuffW 82640->82641 82645 409b09 moneypunct 82640->82645 82640->82696 82641->82645 82683 42cf10 _memcpy_s 82642->82683 82684 409b88 moneypunct 82645->82684 82941 47d10e 152 API calls 82645->82941 82646 4092c0 VariantClear 82647 42e5e0 82646->82647 82971 410ae0 VariantClear moneypunct 82647->82971 82649 42e5f2 82650 409e4a 82652 41171a 77 API calls 82650->82652 82657 409ea4 82650->82657 82650->82683 82651 40aa5b 82654 41171a 77 API calls 82651->82654 82652->82657 82653 41171a 77 API calls 82653->82684 82671 40aa81 _memcpy_s moneypunct 82654->82671 82655 409ed0 82659 42d50d 82655->82659 82720 409ef8 _memcpy_s moneypunct 82655->82720 82949 40b800 VariantClear VariantClear moneypunct 82655->82949 82656 40c3e0 77 API calls 82656->82684 82657->82655 82658 41171a 77 API calls 82657->82658 82660 42d480 82658->82660 82665 42d527 82659->82665 82950 40b800 VariantClear VariantClear moneypunct 82659->82950 82664 42d491 82660->82664 82946 44b3f6 77 API calls 82660->82946 82661 42d195 VariantClear 82661->82684 82663 40a3a7 82669 40a415 82663->82669 82716 42db5c 82663->82716 82674 40df50 77 API calls 82664->82674 82665->82720 82951 40e2e0 VariantClear moneypunct 82665->82951 82666 4092c0 VariantClear 82666->82684 82673 41171a 77 API calls 82669->82673 82680 41171a 77 API calls 82671->82680 82688 40a41c 82673->82688 82676 42d4a6 82674->82676 82947 4530b3 77 API calls 82676->82947 82678 42db96 82957 45e62e 118 API calls 3 library calls 82678->82957 82680->82696 82682 42d128 82686 4092c0 VariantClear 82682->82686 82970 45e62e 118 API calls 3 library calls 82683->82970 82684->82650 82684->82651 82684->82653 82684->82656 82684->82661 82684->82666 82684->82671 82684->82682 82684->82683 82687 42d20c 82684->82687 82694 42dbb9 82684->82694 82942 40c620 120 API calls 82684->82942 82944 40be00 77 API calls 2 library calls 82684->82944 82945 40e380 VariantClear moneypunct 82684->82945 82685 42d4d7 82948 4530b3 77 API calls 82685->82948 82690 42d131 82686->82690 82687->82548 82701 40a481 82688->82701 82958 40c8a0 VariantClear moneypunct 82688->82958 82943 410ae0 VariantClear moneypunct 82690->82943 82694->82646 82940 401380 77 API calls 82696->82940 82697 41171a 77 API calls 82697->82720 82698 44b3f6 77 API calls 82698->82720 82700 4092c0 VariantClear 82731 40a534 _memcpy_s moneypunct 82700->82731 82702 40a4ed 82701->82702 82704 42dc1e VariantClear 82701->82704 82701->82731 82708 40a4ff moneypunct 82702->82708 82959 40e380 VariantClear moneypunct 82702->82959 82703 402cc0 77 API calls 82703->82720 82704->82708 82707 41171a 77 API calls 82707->82731 82708->82707 82708->82731 82712 42deb6 VariantClear 82712->82731 82713 411421 76 API calls __cinit 82713->82720 82714 40a73c 82717 42e237 82714->82717 82724 40a76b 82714->82724 82715 40e380 VariantClear 82715->82731 82956 4721e5 VariantClear 82716->82956 82963 46e709 VariantClear VariantClear moneypunct 82717->82963 82718 42df47 VariantClear 82718->82731 82719 42dfe9 VariantClear 82719->82731 82720->82663 82720->82678 82720->82696 82720->82697 82720->82698 82720->82703 82720->82713 82720->82716 82723 40a053 82720->82723 82952 45ee98 77 API calls 82720->82952 82953 4019e0 78 API calls 82720->82953 82954 404260 78 API calls 82720->82954 82955 409210 VariantClear 82720->82955 82721 40a7a2 82738 40a7ad moneypunct 82721->82738 82964 40b800 VariantClear VariantClear moneypunct 82721->82964 82723->82548 82724->82721 82747 40a800 moneypunct 82724->82747 82939 40b800 VariantClear VariantClear moneypunct 82724->82939 82727 41171a 77 API calls 82727->82731 82728 40a8b0 82742 40a8c2 moneypunct 82728->82742 82966 40e380 VariantClear moneypunct 82728->82966 82729 42e312 82732 42e337 VariantClear 82729->82732 82729->82742 82730 41171a 77 API calls 82733 42dd10 VariantInit VariantCopy 82730->82733 82731->82700 82731->82712 82731->82714 82731->82715 82731->82717 82731->82718 82731->82719 82731->82727 82731->82730 82960 46e9cd 77 API calls 82731->82960 82961 409210 VariantClear 82731->82961 82962 44cc6c VariantClear moneypunct 82731->82962 82732->82742 82733->82731 82737 42dd30 VariantClear 82733->82737 82734 40a7ee 82734->82747 82965 40e380 VariantClear moneypunct 82734->82965 82736 42e3b2 82743 42e3da VariantClear 82736->82743 82749 40a91a moneypunct 82736->82749 82737->82731 82738->82734 82739 42e2a7 VariantClear 82738->82739 82738->82747 82739->82747 82740 40a908 82740->82749 82967 40e380 VariantClear moneypunct 82740->82967 82742->82736 82742->82740 82743->82749 82745 42e47f 82750 42e4a3 VariantClear 82745->82750 82755 40a957 moneypunct 82745->82755 82747->82728 82747->82729 82748 40a945 82748->82755 82968 40e380 VariantClear moneypunct 82748->82968 82749->82745 82749->82748 82750->82755 82752 40aa22 moneypunct 82752->82548 82753 42e559 VariantClear 82753->82755 82755->82752 82755->82753 82969 40e380 VariantClear moneypunct 82755->82969 82756->82512 82757->82516 82758->82516 82759->82516 82760->82516 82761->82516 82762->82516 82764 40412e 82763->82764 82765 4092c0 VariantClear 82764->82765 82766 404138 82765->82766 82766->82538 82767->82516 82768->82516 82769->82548 82770->82511 82771->82548 82772->82548 82773->82554 82774->82558 82775->82573 82776->82574 82777->82561 82778->82599 82779->82605 82780->82582 82781->82607 82782->82582 82783->82607 82784->82582 82785->82591 82786->82607 82787->82595 82788->82607 82789->82588 82790->82613 82792 4092c0 VariantClear 82791->82792 82793 40416e 82792->82793 82794 404120 VariantClear 82793->82794 82795 40419b 82794->82795 82801 40efe0 82795->82801 82809 4734b7 82795->82809 82796 4041c6 82796->82610 82796->82621 82799->82610 82800->82612 82802 40eff5 CreateFileW 82801->82802 82803 4299bf 82801->82803 82804 40f017 82802->82804 82803->82804 82805 4299c4 CreateFileW 82803->82805 82804->82796 82805->82804 82806 4299ea 82805->82806 82853 40e0d0 SetFilePointerEx SetFilePointerEx 82806->82853 82808 4299f5 82808->82804 82810 453063 113 API calls 82809->82810 82811 4734d7 82810->82811 82812 473545 82811->82812 82813 47350c 82811->82813 82854 463c42 82812->82854 82815 4092c0 VariantClear 82813->82815 82820 473514 82815->82820 82816 473558 82817 47355c 82816->82817 82833 473595 82816->82833 82819 4092c0 VariantClear 82817->82819 82818 473616 82867 463d7e 82818->82867 82829 473564 82819->82829 82820->82796 82822 453063 113 API calls 82822->82833 82823 473622 82824 473697 82823->82824 82825 47362c 82823->82825 82901 457838 82824->82901 82828 4092c0 VariantClear 82825->82828 82831 473634 82828->82831 82829->82796 82831->82796 82832 473655 82835 4092c0 VariantClear 82832->82835 82833->82818 82833->82822 82833->82832 82913 462f5a 89 API calls __wcsicoll 82833->82913 82847 47365d 82835->82847 82837 4736b0 82914 45e62e 118 API calls 3 library calls 82837->82914 82838 4736c9 82915 40e7e0 78 API calls 82838->82915 82841 4736ba GetCurrentProcess TerminateProcess 82841->82838 82842 4736db 82851 4736ff 82842->82851 82916 40d030 78 API calls 82842->82916 82844 473731 82849 473744 FreeLibrary 82844->82849 82850 47374b 82844->82850 82845 4736f1 82917 46b945 136 API calls 2 library calls 82845->82917 82847->82796 82849->82850 82850->82796 82851->82844 82918 40d030 78 API calls 82851->82918 82919 46b945 136 API calls 2 library calls 82851->82919 82853->82808 82920 45335b 78 API calls 82854->82920 82856 463c5d 82921 442c52 82 API calls _wcslen 82856->82921 82858 463c72 82860 40c060 77 API calls 82858->82860 82866 463cac 82858->82866 82861 463c8e 82860->82861 82922 4608ce 77 API calls _memcpy_s 82861->82922 82863 463ca4 82864 40c740 77 API calls 82863->82864 82864->82866 82865 463cf7 82865->82816 82866->82865 82923 462f5a 89 API calls __wcsicoll 82866->82923 82868 453063 113 API calls 82867->82868 82869 463d99 82868->82869 82870 463de0 82869->82870 82871 463dca 82869->82871 82925 40c760 80 API calls 82870->82925 82924 453081 113 API calls 82871->82924 82874 463dd0 LoadLibraryW 82876 463e09 82874->82876 82875 463de7 82880 463e19 82875->82880 82926 40c760 80 API calls 82875->82926 82878 463e3e 82876->82878 82876->82880 82881 463e4e 82878->82881 82882 463e7b 82878->82882 82879 463dfb 82879->82880 82927 40c760 80 API calls 82879->82927 82880->82823 82928 40d500 82881->82928 82934 40c760 80 API calls 82882->82934 82887 463e82 GetProcAddress 82889 463e90 82887->82889 82889->82880 82891 463edf 82889->82891 82892 463e79 82889->82892 82890 463e62 GetProcAddress 82890->82892 82891->82880 82895 463eef FreeLibrary 82891->82895 82892->82889 82935 403470 77 API calls _memcpy_s 82892->82935 82894 463eb4 82896 40d500 77 API calls 82894->82896 82895->82880 82897 463ebd 82896->82897 82936 45efe7 79 API calls moneypunct 82897->82936 82899 463ec8 GetProcAddress 82937 401330 moneypunct 82899->82937 82902 457a4c 82901->82902 82908 45785f _strcat moneypunct _wcslen _wcscpy 82901->82908 82909 410d40 82902->82909 82903 40c760 80 API calls 82903->82908 82904 453081 113 API calls 82904->82908 82905 443576 80 API calls 82905->82908 82906 4138ba 69 API calls _malloc 82906->82908 82907 40f580 79 API calls 82907->82908 82908->82902 82908->82903 82908->82904 82908->82905 82908->82906 82908->82907 82911 410d55 82909->82911 82910 410ded VirtualProtect 82912 410dbb 82910->82912 82911->82910 82911->82912 82912->82837 82912->82838 82913->82833 82914->82841 82915->82842 82916->82845 82917->82851 82918->82851 82919->82851 82920->82856 82921->82858 82922->82863 82923->82865 82924->82874 82925->82875 82926->82879 82927->82876 82929 41171a 77 API calls 82928->82929 82930 40d515 82929->82930 82931 41171a 77 API calls 82930->82931 82932 40d521 82931->82932 82933 45efe7 79 API calls moneypunct 82932->82933 82933->82890 82934->82887 82935->82894 82936->82899 82937->82891 82938->82631 82939->82721 82940->82639 82941->82645 82942->82684 82943->82752 82944->82684 82945->82684 82946->82664 82947->82685 82948->82655 82949->82659 82950->82665 82951->82720 82952->82720 82953->82720 82954->82720 82955->82720 82956->82678 82957->82694 82958->82688 82959->82708 82960->82731 82961->82731 82962->82731 82963->82721 82964->82738 82965->82747 82966->82742 82967->82749 82968->82755 82969->82755 82970->82694 82971->82649 82972 42919b 82977 40ef10 82972->82977 82975 411421 __cinit 76 API calls 82976 4291aa 82975->82976 82978 41171a 77 API calls 82977->82978 82979 40ef17 82978->82979 82980 42ad48 82979->82980 82985 40ef40 76 API calls __cinit 82979->82985 82982 40ef2a 82986 40e470 82982->82986 82985->82982 82987 40c060 77 API calls 82986->82987 82988 40e483 GetVersionExW 82987->82988 82989 4021e0 77 API calls 82988->82989 82990 40e4bb 82989->82990 83012 40e600 82990->83012 82994 42accc 82998 42ad28 GetSystemInfo 82994->82998 83001 42ad38 GetSystemInfo 82998->83001 82999 40e557 GetCurrentProcess 83032 40ee30 LoadLibraryA GetProcAddress 82999->83032 83002 40e56c 83002->83001 83025 40eee0 83002->83025 83005 40e5c9 83029 40eea0 83005->83029 83008 40e5e0 83010 40e5f1 FreeLibrary 83008->83010 83011 40e5f4 83008->83011 83009 40e5dd FreeLibrary 83009->83008 83010->83011 83011->82975 83013 40e60b 83012->83013 83014 40c740 77 API calls 83013->83014 83015 40e4c2 83014->83015 83016 40e620 83015->83016 83017 40e62a 83016->83017 83018 42ac93 83017->83018 83019 40c740 77 API calls 83017->83019 83020 40e4ce 83019->83020 83020->82994 83021 40ee70 83020->83021 83022 40e551 83021->83022 83023 40ee76 LoadLibraryA 83021->83023 83022->82999 83022->83002 83023->83022 83024 40ee87 GetProcAddress 83023->83024 83024->83022 83026 40e5bf 83025->83026 83027 40eee6 LoadLibraryA 83025->83027 83026->82998 83026->83005 83027->83026 83028 40eef7 GetProcAddress 83027->83028 83028->83026 83033 40eec0 LoadLibraryA GetProcAddress 83029->83033 83031 40e5d3 GetNativeSystemInfo 83031->83008 83031->83009 83032->83002 83033->83031 83034 34af130 83048 34acd80 83034->83048 83036 34af1e3 83051 34af020 83036->83051 83038 34af20c CreateFileW 83040 34af25b 83038->83040 83041 34af260 83038->83041 83041->83040 83042 34af277 VirtualAlloc 83041->83042 83042->83040 83043 34af295 ReadFile 83042->83043 83043->83040 83044 34af2b0 83043->83044 83045 34ae020 12 API calls 83044->83045 83047 34af2e3 83045->83047 83046 34af306 ExitProcess 83046->83040 83047->83046 83050 34ad40b 83048->83050 83054 34b0210 GetPEB 83048->83054 83050->83036 83052 34af029 Sleep 83051->83052 83053 34af037 83052->83053 83054->83050 83055 42e89e 83062 40c000 83055->83062 83057 42e8ac 83058 409a40 167 API calls 83057->83058 83059 42e8ca 83058->83059 83073 44b92e VariantClear 83059->83073 83061 42f3ae 83063 40c014 83062->83063 83064 40c007 83062->83064 83066 40c01a 83063->83066 83067 40c02c 83063->83067 83074 409210 VariantClear 83064->83074 83075 409210 VariantClear 83066->83075 83068 41171a 77 API calls 83067->83068 83072 40c033 83068->83072 83069 40c00f 83069->83057 83071 40c023 83071->83057 83072->83057 83073->83061 83074->83069 83075->83071 83076 4803f4 83077 48046c 83076->83077 83078 4804a7 83076->83078 83080 480499 83077->83080 83081 480473 83077->83081 83079 40c060 77 API calls 83078->83079 83102 4804b0 83079->83102 83109 47fea8 120 API calls 83080->83109 83083 480478 83081->83083 83084 48048b 83081->83084 83083->83078 83085 48047d 83083->83085 83108 47f6ef 120 API calls __itow_s 83084->83108 83107 47e8db 120 API calls 83085->83107 83088 40df50 77 API calls 83088->83102 83090 4092c0 VariantClear 83092 480b51 83090->83092 83091 480486 83091->83090 83094 4092c0 VariantClear 83092->83094 83093 40c3e0 77 API calls 83093->83102 83095 480b5a 83094->83095 83098 40e6d0 78 API calls 83098->83102 83099 409210 VariantClear 83099->83102 83100 480564 83116 45e62e 118 API calls 3 library calls 83100->83116 83102->83088 83102->83091 83102->83093 83102->83098 83102->83099 83102->83100 83103 40c760 80 API calls 83102->83103 83110 4019e0 78 API calls 83102->83110 83111 4533dc 77 API calls 83102->83111 83112 45e85e 78 API calls 83102->83112 83113 40e7e0 78 API calls 83102->83113 83114 476958 78 API calls 83102->83114 83115 47f529 119 API calls 83102->83115 83103->83102 83107->83091 83108->83091 83109->83091 83110->83102 83111->83102 83112->83102 83113->83102 83114->83102 83115->83102 83116->83091 83117 4291df 83122 40ddd0 83117->83122 83120 411421 __cinit 76 API calls 83121 4291ee 83120->83121 83123 40c060 77 API calls 83122->83123 83124 40de43 83123->83124 83129 40f0d0 83124->83129 83126 40dee0 83128 40df04 83126->83128 83132 40dd50 83126->83132 83128->83120 83138 40f110 RegOpenKeyExW 83129->83138 83133 40dd81 83132->83133 83137 40dd58 _memcpy_s moneypunct 83132->83137 83136 41171a 77 API calls 83133->83136 83134 41171a 77 API calls 83135 40dd5f 83134->83135 83135->83126 83136->83137 83137->83134 83139 40f13c RegQueryValueExW RegCloseKey 83138->83139 83140 40f0ee 83138->83140 83139->83140 83140->83126
            APIs
            • _wcslen.LIBCMT ref: 00409A61
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
            • CharUpperBuffW.USER32(?,?), ref: 00409AF5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID: 0vH$4RH
            • API String ID: 1143807570-2085553193
            • Opcode ID: ca5efaba4490574011d478febeb3435d410ff67b3515fcc5ed7fd1e1b79fd58d
            • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
            • Opcode Fuzzy Hash: ca5efaba4490574011d478febeb3435d410ff67b3515fcc5ed7fd1e1b79fd58d
            • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1203 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 1212 40e506-40e509 1203->1212 1213 42accc-42acd1 1203->1213 1216 40e540-40e555 call 40ee70 1212->1216 1217 40e50b-40e51c 1212->1217 1214 42acd3-42acdb 1213->1214 1215 42acdd-42ace0 1213->1215 1219 42ad12-42ad20 1214->1219 1220 42ace2-42aceb 1215->1220 1221 42aced-42acf0 1215->1221 1232 40e557-40e573 GetCurrentProcess call 40ee30 1216->1232 1233 40e579-40e5a8 1216->1233 1222 40e522-40e525 1217->1222 1223 42ac9b-42aca7 1217->1223 1231 42ad28-42ad2d GetSystemInfo 1219->1231 1220->1219 1221->1219 1227 42acf2-42ad06 1221->1227 1222->1216 1228 40e527-40e537 1222->1228 1225 42acb2-42acba 1223->1225 1226 42aca9-42acad 1223->1226 1225->1216 1226->1216 1234 42ad08-42ad0c 1227->1234 1235 42ad0e 1227->1235 1229 42acbf-42acc7 1228->1229 1230 40e53d 1228->1230 1229->1216 1230->1216 1237 42ad38-42ad3d GetSystemInfo 1231->1237 1232->1233 1244 40e575 1232->1244 1233->1237 1238 40e5ae-40e5c3 call 40eee0 1233->1238 1234->1219 1235->1219 1238->1231 1243 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 1238->1243 1247 40e5e0-40e5ef 1243->1247 1248 40e5dd-40e5de FreeLibrary 1243->1248 1244->1233 1249 40e5f1-40e5f2 FreeLibrary 1247->1249 1250 40e5f4-40e5ff 1247->1250 1248->1247 1249->1250
            APIs
            • GetVersionExW.KERNEL32 ref: 0040E495
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
            • GetNativeSystemInfo.KERNEL32(?,?), ref: 0040E5D3
            • FreeLibrary.KERNEL32(?), ref: 0040E5DE
            • FreeLibrary.KERNEL32(?), ref: 0040E5F2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
            • String ID: pMH
            • API String ID: 2923339712-2522892712
            • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
            • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
            • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
            • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1577 40eb70-40eb74 1578 40eb96 1577->1578 1579 40eb76-40eb85 LoadLibraryA 1577->1579 1579->1578 1580 40eb87-40eb93 GetProcAddress 1579->1580 1580->1578
            APIs
            • LoadLibraryA.KERNEL32(uxtheme.dll), ref: 0040EB7B
            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: IsThemeActive$uxtheme.dll
            • API String ID: 2574300362-3542929980
            • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
            • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
            • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
            • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

            Control-flow Graph

            APIs
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
            • __wsplitpath.LIBCMT ref: 00410C61
              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
            • _wcsncat.LIBCMT ref: 00410C78
            • __wmakepath.LIBCMT ref: 00410C94
              • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
            • _wcscpy.LIBCMT ref: 00410CCC
            • RegOpenKeyExW.KERNEL32 ref: 00410CE9
            • RegQueryValueExW.ADVAPI32 ref: 00429BE4
            • _wcscat.LIBCMT ref: 00429C43
            • _wcslen.LIBCMT ref: 00429C55
            • _wcslen.LIBCMT ref: 00429C66
            • _wcscat.LIBCMT ref: 00429C80
            • _wcsncpy.LIBCMT ref: 00429CC0
            • RegCloseKey.ADVAPI32(?), ref: 00429CDE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID: 8 $Include$Software\AutoIt v3\AutoIt$\$\
            • API String ID: 1004883554-3120132362
            • Opcode ID: f84f773e5c1f596ad2c6b40a9b7963d16100886af7a674061cbd7d72c3873958
            • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
            • Opcode Fuzzy Hash: f84f773e5c1f596ad2c6b40a9b7963d16100886af7a674061cbd7d72c3873958
            • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A
            APIs
              • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
              • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
            • Sleep.KERNEL32(0000000A), ref: 00409870
            • timeGetTime.WINMM ref: 00409880
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: BuffCharSleepTimeUpper_wcslentime
            • String ID:
            • API String ID: 3219444185-0
            • Opcode ID: da6b74c52f7fd8fa7285d44dc66266380a963bd06260c315e722df216112258b
            • Instruction ID: 79dfb759edd1749a95aa3438e3198289cebfc990e9c1b7da565b255c5aac8c6d
            • Opcode Fuzzy Hash: da6b74c52f7fd8fa7285d44dc66266380a963bd06260c315e722df216112258b
            • Instruction Fuzzy Hash: D422F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __fread_nolock$_fseek_wcscpy
            • String ID: FILE
            • API String ID: 3888824918-3121273764
            • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
            • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
            • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
            • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32 ref: 004101F9
            • LoadCursorW.USER32 ref: 00410209
            • LoadIconW.USER32 ref: 0041021F
            • LoadIconW.USER32 ref: 00410232
            • LoadIconW.USER32 ref: 00410245
            • LoadImageW.USER32 ref: 0041026A
            • RegisterClassExW.USER32 ref: 004102C6
              • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
              • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
              • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
              • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
              • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
              • Part of subcall function 004102F0: LoadIconW.USER32 ref: 004103B1
              • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(0094B6A0,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$PGH
            • API String ID: 423443420-3673556320
            • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
            • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
            • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
            • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

            Control-flow Graph

            APIs
            • _fseek.LIBCMT ref: 004525DA
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
            • __fread_nolock.LIBCMT ref: 00452618
            • __fread_nolock.LIBCMT ref: 00452629
            • __fread_nolock.LIBCMT ref: 00452644
            • __fread_nolock.LIBCMT ref: 00452661
            • _fseek.LIBCMT ref: 0045267D
            • _malloc.LIBCMT ref: 00452689
            • _malloc.LIBCMT ref: 00452696
            • __fread_nolock.LIBCMT ref: 004526A7
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __fread_nolock$_fseek_malloc_wcscpy
            • String ID:
            • API String ID: 1911931848-0
            • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
            • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
            • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
            • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1293 40f450-40f45c call 425210 1296 40f460-40f478 1293->1296 1296->1296 1297 40f47a-40f4a8 call 413990 call 410f70 1296->1297 1302 40f4b0-40f4d1 call 4151b0 1297->1302 1305 40f531 1302->1305 1306 40f4d3-40f4da 1302->1306 1307 40f536-40f540 1305->1307 1308 40f4dc-40f4de 1306->1308 1309 40f4fd-40f517 call 41557c 1306->1309 1310 40f4e0-40f4e2 1308->1310 1313 40f51c-40f51f 1309->1313 1312 40f4e6-40f4ed 1310->1312 1314 40f521-40f52c 1312->1314 1315 40f4ef-40f4f2 1312->1315 1313->1302 1316 40f543-40f54e 1314->1316 1317 40f52e-40f52f 1314->1317 1318 42937a-4293a0 call 41557c call 4151b0 1315->1318 1319 40f4f8-40f4fb 1315->1319 1320 40f550-40f553 1316->1320 1321 40f555-40f560 1316->1321 1317->1315 1329 4293a5-4293c3 call 4151d0 1318->1329 1319->1309 1319->1310 1320->1315 1323 429372 1321->1323 1324 40f566-40f571 1321->1324 1323->1318 1327 429361-429367 1324->1327 1328 40f577-40f57a 1324->1328 1327->1312 1330 42936d 1327->1330 1328->1315 1329->1307 1330->1323
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __fread_nolock_fseek_strcat
            • String ID: AU3!$EA06
            • API String ID: 3818483258-2658333250
            • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
            • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
            • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
            • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1333 410130-410142 SHGetMalloc 1334 410148-410158 SHGetDesktopFolder 1333->1334 1335 42944f-429459 call 411691 1333->1335 1336 4101d1-4101e0 1334->1336 1337 41015a-410188 call 411691 1334->1337 1336->1335 1343 4101e6-4101ee 1336->1343 1345 4101c5-4101ce 1337->1345 1346 41018a-4101a1 SHGetPathFromIDListW 1337->1346 1345->1336 1347 4101a3-4101b1 call 411691 1346->1347 1348 4101b4-4101c0 1346->1348 1347->1348 1348->1345
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcscpy$DesktopFolderFromListMallocPath
            • String ID: C:\Users\user\Desktop\Proforma Invoice_pdf.exe
            • API String ID: 192938534-4288302982
            • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
            • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
            • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
            • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1351 401230-40123b 1352 401241-401272 call 4131f0 call 401be0 1351->1352 1353 4012c5-4012cd 1351->1353 1358 401274-401292 1352->1358 1359 4012ae-4012bf KillTimer SetTimer 1352->1359 1360 42aa61-42aa67 1358->1360 1361 401298-40129c 1358->1361 1359->1353 1364 42aa8b-42aaa7 Shell_NotifyIconW 1360->1364 1365 42aa69-42aa86 Shell_NotifyIconW 1360->1365 1362 4012a2-4012a8 1361->1362 1363 42aaac-42aab3 1361->1363 1362->1359 1366 42aaf8-42ab15 Shell_NotifyIconW 1362->1366 1367 42aad7-42aaf3 Shell_NotifyIconW 1363->1367 1368 42aab5-42aad2 Shell_NotifyIconW 1363->1368 1364->1359 1365->1359 1366->1359 1367->1359 1368->1359
            APIs
            • _memset.LIBCMT ref: 00401257
              • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
              • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
              • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
              • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
            • KillTimer.USER32 ref: 004012B0
            • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
            • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
            • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
            • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
            • String ID:
            • API String ID: 1792922140-0
            • Opcode ID: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
            • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
            • Opcode Fuzzy Hash: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
            • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1369 34af360-34af40e call 34acd80 1372 34af415-34af43b call 34b0270 CreateFileW 1369->1372 1375 34af43d 1372->1375 1376 34af442-34af452 1372->1376 1377 34af58d-34af591 1375->1377 1383 34af459-34af473 VirtualAlloc 1376->1383 1384 34af454 1376->1384 1378 34af5d3-34af5d6 1377->1378 1379 34af593-34af597 1377->1379 1385 34af5d9-34af5e0 1378->1385 1381 34af599-34af59c 1379->1381 1382 34af5a3-34af5a7 1379->1382 1381->1382 1388 34af5a9-34af5b3 1382->1388 1389 34af5b7-34af5bb 1382->1389 1390 34af47a-34af491 ReadFile 1383->1390 1391 34af475 1383->1391 1384->1377 1386 34af5e2-34af5ed 1385->1386 1387 34af635-34af64a 1385->1387 1392 34af5ef 1386->1392 1393 34af5f1-34af5fd 1386->1393 1394 34af65a-34af662 1387->1394 1395 34af64c-34af657 VirtualFree 1387->1395 1388->1389 1396 34af5cb 1389->1396 1397 34af5bd-34af5c7 1389->1397 1398 34af498-34af4d8 VirtualAlloc 1390->1398 1399 34af493 1390->1399 1391->1377 1392->1387 1402 34af5ff-34af60f 1393->1402 1403 34af611-34af61d 1393->1403 1395->1394 1396->1378 1397->1396 1400 34af4da 1398->1400 1401 34af4df-34af4fa call 34b04c0 1398->1401 1399->1377 1400->1377 1409 34af505-34af50f 1401->1409 1405 34af633 1402->1405 1406 34af62a-34af630 1403->1406 1407 34af61f-34af628 1403->1407 1405->1385 1406->1405 1407->1405 1410 34af542-34af556 call 34b02d0 1409->1410 1411 34af511-34af540 call 34b04c0 1409->1411 1417 34af55a-34af55e 1410->1417 1418 34af558 1410->1418 1411->1409 1419 34af56a-34af56e 1417->1419 1420 34af560-34af564 CloseHandle 1417->1420 1418->1377 1421 34af57e-34af587 1419->1421 1422 34af570-34af57b VirtualFree 1419->1422 1420->1419 1421->1372 1421->1377 1422->1421
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 034AF431
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 034AF657
            Memory Dump Source
            • Source File: 00000000.00000002.358006405.00000000034AC000.00000040.00000020.00020000.00000000.sdmp, Offset: 034AC000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_34ac000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
            • Instruction ID: 7cd258cdc3d9d0d806821319b8dc85d1feb1477ba710b5fa278d236ec63b8123
            • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
            • Instruction Fuzzy Hash: C8A13A74E00209EBDB14CFA8C894BEEB7B5FF58304F20855AE111BB291D7759A45CF98

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1423 414f10-414f2c 1424 414f4f 1423->1424 1425 414f2e-414f31 1423->1425 1426 414f51-414f55 1424->1426 1425->1424 1427 414f33-414f35 1425->1427 1428 414f37-414f46 call 417f23 1427->1428 1429 414f56-414f5b 1427->1429 1437 414f47-414f4c call 417ebb 1428->1437 1430 414f6a-414f6d 1429->1430 1431 414f5d-414f68 1429->1431 1435 414f7a-414f7c 1430->1435 1436 414f6f-414f77 call 4131f0 1430->1436 1431->1430 1434 414f8b-414f9e 1431->1434 1440 414fa0-414fa6 1434->1440 1441 414fa8 1434->1441 1435->1428 1439 414f7e-414f89 1435->1439 1436->1435 1437->1424 1439->1428 1439->1434 1442 414faf-414fb1 1440->1442 1441->1442 1445 4150a1-4150a4 1442->1445 1446 414fb7-414fbe 1442->1446 1445->1426 1448 414fc0-414fc5 1446->1448 1449 415004-415007 1446->1449 1448->1449 1450 414fc7 1448->1450 1451 415071-415072 call 41e6b1 1449->1451 1452 415009-41500d 1449->1452 1453 415102 1450->1453 1454 414fcd-414fd1 1450->1454 1463 415077-41507b 1451->1463 1456 41500f-415018 1452->1456 1457 41502e-415035 1452->1457 1458 415106-41510f 1453->1458 1461 414fd3 1454->1461 1462 414fd5-414fd8 1454->1462 1464 415023-415028 1456->1464 1465 41501a-415021 1456->1465 1459 415037 1457->1459 1460 415039-41503c 1457->1460 1458->1426 1459->1460 1467 415042-41504e call 41453a call 41ed9e 1460->1467 1468 4150d5-4150d9 1460->1468 1461->1462 1469 4150a9-4150af 1462->1469 1470 414fde-414fff call 41ee9b 1462->1470 1463->1458 1471 415081-415085 1463->1471 1466 41502a-41502c 1464->1466 1465->1466 1466->1460 1491 415053-415058 1467->1491 1476 4150eb-4150fd call 417f23 1468->1476 1477 4150db-4150e8 call 4131f0 1468->1477 1472 4150b1-4150bd call 4131f0 1469->1472 1473 4150c0-4150d0 call 417f23 1469->1473 1479 415099-41509b 1470->1479 1471->1468 1478 415087-415096 1471->1478 1472->1473 1473->1437 1476->1437 1477->1476 1478->1479 1479->1445 1479->1446 1492 415114-415118 1491->1492 1493 41505e-415061 1491->1493 1492->1458 1493->1453 1494 415067-41506f 1493->1494 1494->1479
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
            • String ID:
            • API String ID: 3886058894-0
            • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
            • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
            • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
            • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1495 4103e0-410461 CreateWindowExW * 2 ShowWindow * 2
            APIs
            • CreateWindowExW.USER32 ref: 00410415
            • CreateWindowExW.USER32 ref: 0041043E
            • ShowWindow.USER32(?,00000000), ref: 00410454
            • ShowWindow.USER32(?,00000000), ref: 0041045E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
            • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
            • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
            • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1496 34af130-34af259 call 34acd80 call 34af020 CreateFileW 1503 34af25b 1496->1503 1504 34af260-34af270 1496->1504 1505 34af310-34af315 1503->1505 1507 34af272 1504->1507 1508 34af277-34af291 VirtualAlloc 1504->1508 1507->1505 1509 34af293 1508->1509 1510 34af295-34af2ac ReadFile 1508->1510 1509->1505 1511 34af2ae 1510->1511 1512 34af2b0-34af2ea call 34af060 call 34ae020 1510->1512 1511->1505 1517 34af2ec-34af301 call 34af0b0 1512->1517 1518 34af306-34af30e ExitProcess 1512->1518 1517->1518 1518->1505
            APIs
              • Part of subcall function 034AF020: Sleep.KERNELBASE(000001F4), ref: 034AF031
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 034AF24F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.358006405.00000000034AC000.00000040.00000020.00020000.00000000.sdmp, Offset: 034AC000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_34ac000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: V5NXN7X5MIE
            • API String ID: 2694422964-2018981241
            • Opcode ID: dfd1d4ccb353151f3d451d5b5ac2519905f43f08192b4390ef47930796a9c750
            • Instruction ID: 41eca26f0eca5fa10a98f3ab2c38a2fd739a6df28905a829cae1cda39114027d
            • Opcode Fuzzy Hash: dfd1d4ccb353151f3d451d5b5ac2519905f43f08192b4390ef47930796a9c750
            • Instruction Fuzzy Hash: 30518135D04249EBEF10DBA4DC54BEFBB79AF14300F004599E208BB2C0D6791B49CBA9

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1520 413a88-413a99 call 41718c 1523 413b10-413b15 call 4171d1 1520->1523 1524 413a9b-413aa2 1520->1524 1525 413aa4-413abc call 418407 call 419f6d 1524->1525 1526 413ae7 1524->1526 1538 413ac7-413ad7 call 413ade 1525->1538 1539 413abe-413ac6 call 419f9d 1525->1539 1528 413ae8-413af8 HeapFree 1526->1528 1528->1523 1531 413afa-413b0f call 417f23 GetLastError call 417ee1 1528->1531 1531->1523 1538->1523 1545 413ad9-413adc 1538->1545 1539->1538 1545->1528
            APIs
            • __lock.LIBCMT ref: 00413AA6
              • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
              • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
              • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
            • ___sbh_find_block.LIBCMT ref: 00413AB1
            • ___sbh_free_block.LIBCMT ref: 00413AC0
            • HeapFree.KERNEL32(00000000,00411739,0048C758), ref: 00413AF0
            • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
            • String ID:
            • API String ID: 2714421763-0
            • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
            • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
            • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
            • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1546 40f5e0-40f62f call 40f580 call 413990 call 4112ef call 40f6a0 call 40f6d0 1557 40f631-40f653 1546->1557 1557->1557 1558 40f655-40f66d call 414e06 1557->1558 1561 40f673-40f67b call 40f450 1558->1561 1562 42b2ee 1558->1562 1565 42b2f8-42b322 call 4151b0 call 44afdc 1561->1565 1566 40f681-40f695 call 414e94 1561->1566 1562->1565 1573 42b324-42b330 1565->1573 1573->1573 1574 42b332-42b338 call 415484 1573->1574 1576 42b33d-42b343 1574->1576
            APIs
              • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
              • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
              • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
            • _strcat.LIBCMT ref: 0040F603
              • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
              • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
            • String ID: HH
            • API String ID: 1194219731-2761332787
            • Opcode ID: ee47fd20779ff5886c3c730aa44a1efa7791f275b5868e90dcef310a8da63108
            • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
            • Opcode Fuzzy Hash: ee47fd20779ff5886c3c730aa44a1efa7791f275b5868e90dcef310a8da63108
            • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
            APIs
            • _malloc.LIBCMT ref: 00411734
              • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
              • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
              • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
            • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
            • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
            • __CxxThrowException@8.LIBCMT ref: 00411779
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
            • String ID:
            • API String ID: 1411284514-0
            • Opcode ID: f6d0f9ac01cc1593a24bd4fb6812cf372efb98f80d14d441c12493078b846558
            • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
            • Opcode Fuzzy Hash: f6d0f9ac01cc1593a24bd4fb6812cf372efb98f80d14d441c12493078b846558
            • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
            APIs
            • CreateProcessW.KERNEL32(?,00000000), ref: 034AE7DB
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 034AE893
            Memory Dump Source
            • Source File: 00000000.00000002.358006405.00000000034AC000.00000040.00000020.00020000.00000000.sdmp, Offset: 034AC000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_34ac000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process$CreateMemoryRead
            • String ID:
            • API String ID: 2726527582-0
            • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
            • Instruction ID: 45b6e29711998ba494f44cee4907e404c5787fcde82bd476dcd16124457a6284
            • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
            • Instruction Fuzzy Hash: 8862EA30A14658DBEB24CFA4C854BDEB376EF68300F1091A9D11DEB390E7769E81CB59
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
            • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
            • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
            • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
            APIs
            • _set_new_mode.LIBCMT ref: 0040D88C
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,000F1C68), ref: 0040D8B9
            • FreeLibrary.KERNEL32(?), ref: 0040D8CE
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: FreeInfoLibraryParametersSystem_set_new_mode
            • String ID:
            • API String ID: 1188159508-0
            • Opcode ID: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
            • Instruction ID: 2b4412acdce639bfbf0f9e0c9ecf3f694f94d165ded01d265c3c64edb54a61d9
            • Opcode Fuzzy Hash: 06ca62d5f0ac41005a4bed089aefec56480100fd5cca74c1e28fe2d3c932602c
            • Instruction Fuzzy Hash: C2215EB19183009FC700EF56D88150ABBE4FB98354F44497EF849A72A2D735A945CB9A
            APIs
            • RegOpenKeyExW.KERNEL32 ref: 0040F132
            • RegQueryValueExW.KERNEL32(?,?,00000000,00000000,80000001,80000001), ref: 0040F14F
            • RegCloseKey.ADVAPI32(00000000), ref: 0040F159
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID:
            • API String ID: 3677997916-0
            • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
            • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
            • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
            • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
            APIs
            • _malloc.LIBCMT ref: 00435278
              • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
              • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
              • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
            • _malloc.LIBCMT ref: 00435288
            • _malloc.LIBCMT ref: 00435298
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _malloc$AllocateHeap
            • String ID:
            • API String ID: 680241177-0
            • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
            • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
            • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
            • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
            APIs
            • __lock.LIBCMT ref: 00411ACE
              • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
              • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
              • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
            • __decode_pointer.LIBCMT ref: 00411AD9
              • Part of subcall function 004169E9: TlsGetValue.KERNEL32(00411739,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 004169FB
              • Part of subcall function 004169E9: TlsGetValue.KERNEL32(00000003,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00416A12
              • Part of subcall function 004169E9: RtlDecodePointer.NTDLL(00411739,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00416A50
            • __encode_pointer.LIBCMT ref: 00411AE3
              • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416980
              • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000003,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416997
              • Part of subcall function 0041696E: RtlEncodePointer.NTDLL(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 004169D5
              • Part of subcall function 0041832D: LeaveCriticalSection.KERNEL32(?,00413AE5,00000004,00413AD3,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004), ref: 0041833C
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Value$CriticalPointerSection$DecodeEncodeEnterLeave__amsg_exit__decode_pointer__encode_pointer__lock__mtinitlocknum
            • String ID:
            • API String ID: 741361212-0
            • Opcode ID: edb43eca56ef027ac361edaff2b5e89f00094b9356cce8bc8a346a0e55979942
            • Instruction ID: 38d776d816f70f727deb20f5ce19c96205530670ca88b6e54865c94596e56b2a
            • Opcode Fuzzy Hash: edb43eca56ef027ac361edaff2b5e89f00094b9356cce8bc8a346a0e55979942
            • Instruction Fuzzy Hash: B9D05EB1A00318B7CA0037E69C07ADA3E45CB407A8F0604BFFB0857252ED3AC85082DD
            APIs
            • _wcslen.LIBCMT ref: 00401B71
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID: @EXITCODE
            • API String ID: 580348202-3436989551
            • Opcode ID: 6cf3cde66a08f965a4344bc1fc3281b19b19243cf66827a1cf885af4ed451a9e
            • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
            • Opcode Fuzzy Hash: 6cf3cde66a08f965a4344bc1fc3281b19b19243cf66827a1cf885af4ed451a9e
            • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 2e6ad9008194001af4a6ffaf6d5577c9fc0db539bc07221a9f788acfd60c8b7c
            • Instruction ID: 1f11e118333250ff1b1cce483c812f274274124743f71e781b8a547d9d3e43da
            • Opcode Fuzzy Hash: 2e6ad9008194001af4a6ffaf6d5577c9fc0db539bc07221a9f788acfd60c8b7c
            • Instruction Fuzzy Hash: 35917E706042009FC714DF55D890A6AB7E5EF89318F14896FF849AB392D738EE41CB9E
            APIs
            • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040F00A
            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 004299D9
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
            • Instruction ID: 855a981e3d87b0586b227f36a287a9e63fe5cd358b5bfab8de368ff291d46a89
            • Opcode Fuzzy Hash: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
            • Instruction Fuzzy Hash: 67011D703803107AF2311F28AD5BF5632546B44B24F244B39FBD5BE2E2D2F86885970C
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __lock_file_memset
            • String ID:
            • API String ID: 26237723-0
            • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
            • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
            • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
            • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
            APIs
              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
            • __lock_file.LIBCMT ref: 00414EE4
              • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
            • __fclose_nolock.LIBCMT ref: 00414EEE
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 717694121-0
            • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
            • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
            • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
            • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
            APIs
            • TranslateMessage.USER32(?), ref: 004098F6
            • DispatchMessageW.USER32(?), ref: 00409901
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Message$DispatchTranslate
            • String ID:
            • API String ID: 1706434739-0
            • Opcode ID: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
            • Instruction ID: 6b3a2aeb923af73eb4cdb1bab797699f2cf27729a5018e8568c19fb4e3feaf67
            • Opcode Fuzzy Hash: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
            • Instruction Fuzzy Hash: D4F05471114301AEDA24DBE58D41B5BB3A8AFD8700F408C2EBA51E61C1FBF8E404C76A
            APIs
            • TranslateMessage.USER32(?), ref: 004098F6
            • DispatchMessageW.USER32(?), ref: 00409901
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Message$DispatchTranslate
            • String ID:
            • API String ID: 1706434739-0
            • Opcode ID: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
            • Instruction ID: cc4909b6a78c34842ee59a7900970f574117f06624f4f9c7373c79b1fb9dfc76
            • Opcode Fuzzy Hash: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
            • Instruction Fuzzy Hash: DDF054B1114301AADA14DBE58D41B5BB3A4AF94740F408C2EBA11E52C1EBFCD504C71A
            APIs
            • KiUserCallbackDispatcher.NTDLL(00002000,00000000,0040D89F,00000000,?,?,0040D89F,000F1C68), ref: 0040F386
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002,?,0040D89F,000F1C68), ref: 0040F39E
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CallbackDispatcherInfoParametersSystemUser
            • String ID:
            • API String ID: 1232580896-0
            • Opcode ID: e8c90ec597a1944ae78b7ca20706975efaf7c61f5b7d6b196fc3d6e6037ce03d
            • Instruction ID: 65e1473dc04fc68897f4a965434dba24c69ef846d3a13abfb0e70c8142ecb83e
            • Opcode Fuzzy Hash: e8c90ec597a1944ae78b7ca20706975efaf7c61f5b7d6b196fc3d6e6037ce03d
            • Instruction Fuzzy Hash: F2E0EC727953107AF21486408C46F56A7989B44B11F10C51AB7059B1C1C6F0A840CB95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0d8ad4d875158e0120ed104e09085659f42b86f6d600f5d33fa38308f41241bf
            • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
            • Opcode Fuzzy Hash: 0d8ad4d875158e0120ed104e09085659f42b86f6d600f5d33fa38308f41241bf
            • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
            APIs
            • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ProcWindow
            • String ID:
            • API String ID: 181713994-0
            • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
            • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
            • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
            • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
            APIs
            • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateHeap
            • String ID:
            • API String ID: 10892065-0
            • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
            • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
            • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
            • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
            APIs
              • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001), ref: 004442F3
            • WriteFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00444362
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: File$PointerWrite
            • String ID:
            • API String ID: 539440098-0
            • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
            • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
            • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
            • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
            APIs
              • Part of subcall function 0041181B: __lock.LIBCMT ref: 0041181D
            • __onexit_nolock.LIBCMT ref: 004113FD
              • Part of subcall function 004112FA: __decode_pointer.LIBCMT ref: 00411309
              • Part of subcall function 004112FA: __decode_pointer.LIBCMT ref: 00411319
              • Part of subcall function 004112FA: __msize.LIBCMT ref: 00411337
              • Part of subcall function 004112FA: __realloc_crt.LIBCMT ref: 0041135B
              • Part of subcall function 004112FA: __realloc_crt.LIBCMT ref: 00411371
              • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 00411383
              • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 00411391
              • Part of subcall function 004112FA: __encode_pointer.LIBCMT ref: 0041139C
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __encode_pointer$__decode_pointer__realloc_crt$__lock__msize__onexit_nolock
            • String ID:
            • API String ID: 1316407801-0
            • Opcode ID: d4f7479c18d2f3dc105ebfe0f2eac5810891221413fa193614bbe2c2ae41d224
            • Instruction ID: 67ef268c6cd115d101ef856db97c2ea624f8e5cc5d3a941a6f1fba9d4c5b72b9
            • Opcode Fuzzy Hash: d4f7479c18d2f3dc105ebfe0f2eac5810891221413fa193614bbe2c2ae41d224
            • Instruction Fuzzy Hash: 07D01731901205AACB00FFAAD8067CC76706F04318F20819AB114662E2CB3C46C19A18
            APIs
            • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ProcWindow
            • String ID:
            • API String ID: 181713994-0
            • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
            • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
            • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
            • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wfsopen
            • String ID:
            • API String ID: 197181222-0
            • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
            • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
            • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
            • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
            APIs
            • __encode_pointer.LIBCMT ref: 004169E2
              • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416980
              • Part of subcall function 0041696E: TlsGetValue.KERNEL32(00000003,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 00416997
              • Part of subcall function 0041696E: RtlEncodePointer.NTDLL(00000000,?,004169E7,00000000,00422F48,00496770,00000000,00000314,?,00418216,00496770,Microsoft Visual C++ Runtime Library,00012010), ref: 004169D5
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Value$EncodePointer__encode_pointer
            • String ID:
            • API String ID: 2585649348-0
            • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
            • Instruction ID: f62f3284a010ca3bbb159d13ec07db3ba5ef3bb17cb580217ffea2be35a92f46
            • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
            • Instruction Fuzzy Hash:
            APIs
            • CloseHandle.KERNELBASE(00000000), ref: 0040D91D
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID:
            • API String ID: 2962429428-0
            • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
            • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
            • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
            • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 034AF031
            Memory Dump Source
            • Source File: 00000000.00000002.358006405.00000000034AC000.00000040.00000020.00020000.00000000.sdmp, Offset: 034AC000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_34ac000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: a98329a2e23fd8b6463035d5fdd061515375b7b4dfe944e7cbb738d7d9541834
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: 5EE0E67494410DDFDB00EFB8DA4969E7FB4EF04302F1041A1FD01D2281D6309D509A62
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: PF$PF$"DF$$JG$&F$&F$'HG$'|G$*"D$*nF$*vG$+%F$0wE$4rE$5CG$6MG$6NF$6tE$7eF$<HF$<G$ApG$BnE$DvE$F)G$GSG$IqE$K@G$LbF$MdF$MuE$NgF$O*F$PIF$QbG$R+F$RnG$YlE$YtG$Z9G$ZPG$^[F$^oE$_7G$_?G$b"D$fH$i}G$j)F$kQG$lE$rTG$vjE$}eE$~mE$*F$.F$3G$_G$`F$mE$pE$wG
            • API String ID: 0-4260964411
            • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
            • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
            • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
            • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
            APIs
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
            • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
            • GetKeyState.USER32(00000011), ref: 0047C1A4
            • GetKeyState.USER32(00000009), ref: 0047C1AD
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
            • GetKeyState.USER32(00000010), ref: 0047C1CA
            • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
            • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
            • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
            • SendMessageW.USER32 ref: 0047C2FB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$State$LongProcWindow
            • String ID: @GUI_DRAGID$F
            • API String ID: 1562745308-4164748364
            • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
            • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
            • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
            • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
            APIs
            • GetForegroundWindow.USER32 ref: 004375B3
            • FindWindowW.USER32 ref: 004375D8
            • IsIconic.USER32(?), ref: 004375E1
            • ShowWindow.USER32(?,00000009), ref: 004375EE
            • SetForegroundWindow.USER32(?), ref: 004375FD
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
            • GetCurrentThreadId.KERNEL32(?,?,004448AF,?), ref: 00437619
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437632
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437638
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043763E
            • SetForegroundWindow.USER32(?), ref: 00437645
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
            • keybd_event.USER32 ref: 0043765D
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
            • keybd_event.USER32 ref: 00437674
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
            • keybd_event.USER32 ref: 0043768B
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
            • keybd_event.USER32 ref: 004376A2
            • SetForegroundWindow.USER32(?), ref: 004376AD
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376CD
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376D3
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004376D9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 3778422247-2988720461
            • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
            • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
            • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
            • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
            APIs
            • _memset.LIBCMT ref: 0044621B
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
            • CloseHandle.KERNEL32(?), ref: 0044628A
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
            • GetProcessWindowStation.USER32 ref: 004462BD
            • SetProcessWindowStation.USER32 ref: 004462C8
            • OpenDesktopW.USER32 ref: 004462E4
            • _wcslen.LIBCMT ref: 0044639E
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            • _wcsncpy.LIBCMT ref: 004463C7
            • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
            • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
            • CreateProcessAsUserW.ADVAPI32 ref: 00446446
            • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
            • CloseWindowStation.USER32(00000000), ref: 00446497
            • CloseDesktop.USER32 ref: 0044649E
            • SetProcessWindowStation.USER32 ref: 004464A9
            • CloseHandle.KERNEL32(?), ref: 004464B4
            • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
            • String ID: $default$winsta0
            • API String ID: 2173856841-1027155976
            • Opcode ID: 794e07af1c9c1cb68973c2f94f3b6c607b21d5fd27dbfc7dd882fd35dae7c352
            • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
            • Opcode Fuzzy Hash: 794e07af1c9c1cb68973c2f94f3b6c607b21d5fd27dbfc7dd882fd35dae7c352
            • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
            APIs
              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,?,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,004A8E80,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,0040F3D2), ref: 0040FFCA
              • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
              • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
              • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
              • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
            • _wcscat.LIBCMT ref: 0044BD96
            • _wcscat.LIBCMT ref: 0044BDBF
            • __wsplitpath.LIBCMT ref: 0044BDEC
            • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
            • _wcscpy.LIBCMT ref: 0044BE73
            • _wcscat.LIBCMT ref: 0044BE85
            • _wcscat.LIBCMT ref: 0044BE97
            • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
            • DeleteFileW.KERNEL32(?), ref: 0044BED5
            • MoveFileW.KERNEL32 ref: 0044BEF5
            • CopyFileW.KERNEL32 ref: 0044BF0C
            • DeleteFileW.KERNEL32(?), ref: 0044BF17
            • CopyFileW.KERNEL32 ref: 0044BF2E
            • FindClose.KERNEL32(00000000), ref: 0044BF35
            • MoveFileW.KERNEL32 ref: 0044BF51
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
            • FindClose.KERNEL32(00000000), ref: 0044BF7E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
            • String ID: \*.*
            • API String ID: 2188072990-1173974218
            • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
            • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
            • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
            • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
            APIs
            • __invoke_watson.LIBCMT ref: 004203A4
              • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
              • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
              • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32 ref: 00417E79
              • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?), ref: 00417E86
              • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
              • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
            • __get_daylight.LIBCMT ref: 004203B0
            • __invoke_watson.LIBCMT ref: 004203BF
            • __get_daylight.LIBCMT ref: 004203CB
            • __invoke_watson.LIBCMT ref: 004203DA
            • ____lc_codepage_func.LIBCMT ref: 004203E2
            • _strlen.LIBCMT ref: 00420442
            • __malloc_crt.LIBCMT ref: 00420449
            • _strlen.LIBCMT ref: 0042045F
            • _strcpy_s.LIBCMT ref: 0042046D
            • __invoke_watson.LIBCMT ref: 00420482
            • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
            • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
            • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
              • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
              • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
              • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
              • Part of subcall function 00413A88: HeapFree.KERNEL32(00000000,00411739,0048C758), ref: 00413AF0
              • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
            • __invoke_watson.LIBCMT ref: 004205CC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
            • String ID: S\
            • API String ID: 4084823496-393906132
            • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
            • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
            • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
            • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
            APIs
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
            • __swprintf.LIBCMT ref: 00434D91
            • _wcslen.LIBCMT ref: 00434D9B
            • _wcslen.LIBCMT ref: 00434DB0
            • _wcslen.LIBCMT ref: 00434DC5
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
            • _memset.LIBCMT ref: 00434E27
            • _wcslen.LIBCMT ref: 00434E3C
            • _wcsncpy.LIBCMT ref: 00434E6F
            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
            • CloseHandle.KERNEL32(00000000), ref: 00434EB4
            • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
            • CloseHandle.KERNEL32(00000000), ref: 00434ECE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
            • String ID: :$\$\??\%s
            • API String ID: 302090198-3457252023
            • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
            • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
            • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
            • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
            APIs
              • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
            • GetLastError.KERNEL32 ref: 004644B4
            • GetCurrentThread.KERNEL32(00000028,00000000,?), ref: 004644C8
            • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
            • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
            • String ID: SeDebugPrivilege
            • API String ID: 1312810259-2896544425
            • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
            • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
            • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
            • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
            APIs
            • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
              • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
              • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
              • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
            • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
            • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\Proforma Invoice_pdf.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
              • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
            • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,00000004), ref: 0040D7D6
            • MessageBoxA.USER32 ref: 00431AAB
            • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,00000004), ref: 00431B0E
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,00000004), ref: 00431B3F
            • GetForegroundWindow.USER32 ref: 00431B8B
            • ShellExecuteW.SHELL32(00000000), ref: 00431B92
              • Part of subcall function 004101F0: GetSysColorBrush.USER32 ref: 004101F9
              • Part of subcall function 004101F0: LoadCursorW.USER32 ref: 00410209
              • Part of subcall function 004101F0: LoadIconW.USER32 ref: 0041021F
              • Part of subcall function 004101F0: LoadIconW.USER32 ref: 00410232
              • Part of subcall function 004101F0: LoadIconW.USER32 ref: 00410245
              • Part of subcall function 004101F0: LoadImageW.USER32 ref: 0041026A
              • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
              • Part of subcall function 004103E0: CreateWindowExW.USER32 ref: 00410415
              • Part of subcall function 004103E0: CreateWindowExW.USER32 ref: 0041043E
              • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
              • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
              • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
              • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
            • String ID: @GH$@GH$C:\Users\user\Desktop\Proforma Invoice_pdf.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
            • API String ID: 2493088469-2441734904
            • Opcode ID: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
            • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
            • Opcode Fuzzy Hash: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
            • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
            • __wsplitpath.LIBCMT ref: 004038B2
              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
            • _wcscpy.LIBCMT ref: 004038C7
            • _wcscat.LIBCMT ref: 004038DC
            • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
              • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
              • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
            • _wcscpy.LIBCMT ref: 004039C2
            • _wcslen.LIBCMT ref: 00403A53
            • _wcslen.LIBCMT ref: 00403AAA
            Strings
            • Error opening the file, xrefs: 0042B8AC
            • _, xrefs: 00403B48
            • Unterminated string, xrefs: 0042B9BA
            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
            • API String ID: 4115725249-188983378
            • Opcode ID: 5c8ff5aa4497b4a6ae766a1db4d44c20e2a53d79bbd935119ae11a08b50845da
            • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
            • Opcode Fuzzy Hash: 5c8ff5aa4497b4a6ae766a1db4d44c20e2a53d79bbd935119ae11a08b50845da
            • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
            • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
            • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
            • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
            • FindClose.KERNEL32(00000000), ref: 00434C88
            • FindClose.KERNEL32(00000000), ref: 00434C9C
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
            • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
            • FindClose.KERNEL32(00000000), ref: 00434D35
            • FindClose.KERNEL32(00000000), ref: 00434D43
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1409584000-438819550
            • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
            • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
            • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
            • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Timetime$Sleep
            • String ID: BUTTON
            • API String ID: 4176159691-3405671355
            • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
            • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
            • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
            • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
            APIs
            • FindFirstFileW.KERNEL32(?,75701228,75701228,?,?,00000000), ref: 00442E40
            • FindNextFileW.KERNEL32(00000000,?,?,00000000), ref: 00442EA4
            • FindClose.KERNEL32(00000000,?,00000000), ref: 00442EB5
            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00442ED1
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00442EF0
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00442F3B
            • SetCurrentDirectoryW.KERNEL32(0048A090,?,?,?,00000000), ref: 00442F6D
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00442F75
            • FindClose.KERNEL32(00000000), ref: 00442F80
              • Part of subcall function 00436D2D: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00436D4F
            • FindClose.KERNEL32(00000000,?,?,?,00000000), ref: 00442F92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 2640511053-438819550
            • Opcode ID: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
            • Instruction ID: 5fd3b3f399b1dfd6b0a62b5043663bf11a2259675d3c80dc16c90576bc2ddb84
            • Opcode Fuzzy Hash: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
            • Instruction Fuzzy Hash: 0F41E8326083046BD620FA64DD85BEFB3A89BC5311F54492FF95483280E7FEA50D8779
            APIs
              • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
              • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
              • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
              • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
            • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
            • _memset.LIBCMT ref: 00445E61
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
            • GetLengthSid.ADVAPI32(?), ref: 00445E92
            • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
            • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
            • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
            • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
            • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3490752873-0
            • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
            • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
            • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
            • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
            APIs
            • OleInitialize.OLE32(00000000), ref: 0047AA03
            • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
            • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
            • _memset.LIBCMT ref: 0047AB7C
            • _wcslen.LIBCMT ref: 0047AC68
            • _memset.LIBCMT ref: 0047ACCD
            • CoCreateInstanceEx.OLE32 ref: 0047AD06
            • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
            Strings
            • NULL Pointer assignment, xrefs: 0047AD84
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
            • String ID: NULL Pointer assignment
            • API String ID: 1588287285-2785691316
            • Opcode ID: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
            • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
            • Opcode Fuzzy Hash: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
            • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
            APIs
            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
            • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
            • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
            • GetLastError.KERNEL32 ref: 00436504
            • ExitWindowsEx.USER32(?,00000000), ref: 00436527
            • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
            • SetSystemPowerState.KERNEL32 ref: 0043656A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 2938487562-3733053543
            • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
            • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
            • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
            • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
            APIs
            • __swprintf.LIBCMT ref: 00436162
            • __swprintf.LIBCMT ref: 00436176
              • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
            • __wcsicoll.LIBCMT ref: 00436185
            • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
            • LoadResource.KERNEL32(?,00000000), ref: 004361AE
            • LockResource.KERNEL32(00000000), ref: 004361B5
            • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
            • LoadResource.KERNEL32(?,00000000), ref: 004361E4
            • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
            • LockResource.KERNEL32(?), ref: 004361FD
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
            • String ID:
            • API String ID: 2406429042-0
            • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
            • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
            • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
            • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D522
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
            • GetLastError.KERNEL32 ref: 0045D59D
            • SetErrorMode.KERNEL32(?), ref: 0045D629
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
            • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
            • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
            • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
            APIs
            • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
              • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
            • OleInitialize.OLE32(00000000), ref: 0047AE06
              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
            • _wcslen.LIBCMT ref: 0047AE18
            • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
            • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AFCC
            • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
            • String ID: HH
            • API String ID: 1915432386-2761332787
            • Opcode ID: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
            • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
            • Opcode Fuzzy Hash: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
            • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
            • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
            • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
            • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
            • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorLast$bindclosesocketsocket
            • String ID:
            • API String ID: 2609815416-0
            • Opcode ID: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
            • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
            • Opcode Fuzzy Hash: f055706b1daf61e2065e9fedb91be4565bf8eae27f8502184711caae908a2a6c
            • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
            • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
            • Process32NextW.KERNEL32(00000000,?), ref: 00437075
            • __wsplitpath.LIBCMT ref: 004370A5
              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
            • _wcscat.LIBCMT ref: 004370BA
            • __wcsicoll.LIBCMT ref: 004370C8
            • CloseHandle.KERNEL32(00000000), ref: 00437105
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 2547909840-0
            • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
            • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
            • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
            • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
            • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
            • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
            • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNextSleep_wcslen
            • String ID: *.*
            • API String ID: 2693929171-438819550
            • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
            • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
            • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
            • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
            APIs
            • OpenClipboard.USER32(?), ref: 0046C635
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
            • GetClipboardData.USER32 ref: 0046C64F
            • CloseClipboard.USER32 ref: 0046C65D
            • GlobalLock.KERNEL32(00000000), ref: 0046C688
            • CloseClipboard.USER32 ref: 0046C692
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
            • GetClipboardData.USER32 ref: 0046C6DD
            • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
            • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
            • CloseClipboard.USER32 ref: 0046C866
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
            • String ID: HH
            • API String ID: 589737431-2761332787
            • Opcode ID: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
            • Instruction ID: 5556deb4c8197336e1b92b5e2a85e957832ef7964462d916cb468ff193882e13
            • Opcode Fuzzy Hash: 76419e0badb028214ed7bad9e924c36871e80023f9f647d131bfc03e45e064d3
            • Instruction Fuzzy Hash: 7301F5762042005FC300AFB9ED45B6A7BA4EF59704F04097FF980A72C1EBB1E915C7AA
            APIs
            • __wcsicoll.LIBCMT ref: 0043643C
            • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
            • __wcsicoll.LIBCMT ref: 00436466
            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsicollmouse_event
            • String ID: DOWN
            • API String ID: 1033544147-711622031
            • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
            • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
            • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
            • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
            APIs
              • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
            • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
            • WSAGetLastError.WSOCK32(00000000), ref: 00474233
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorLastinet_addrsocket
            • String ID:
            • API String ID: 4170576061-0
            • Opcode ID: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
            • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
            • Opcode Fuzzy Hash: c11ce247c64ee683b380b6a697379cd3ea863651eb179087c325b129d43524e0
            • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
            APIs
            • GetCursorPos.USER32(004A83D8), ref: 0045636A
            • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
            • GetAsyncKeyState.USER32 ref: 004563D0
            • GetAsyncKeyState.USER32 ref: 004563DC
            • GetWindowLongW.USER32(?,000000F0), ref: 00456430
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorLongScreenWindow
            • String ID:
            • API String ID: 3539004672-0
            • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
            • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
            • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
            • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
            APIs
              • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
            • IsWindowVisible.USER32 ref: 00477314
            • IsWindowEnabled.USER32 ref: 00477324
            • GetForegroundWindow.USER32 ref: 00477331
            • IsIconic.USER32 ref: 0047733F
            • IsZoomed.USER32 ref: 0047734D
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
            • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
            • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
            • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
            APIs
            • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00436D4F
            • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
            • CloseHandle.KERNEL32(00000000), ref: 00436D93
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: File$CloseCreateHandleTime
            • String ID:
            • API String ID: 3397143404-0
            • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
            • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
            • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
            • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: ERCP$VUUU$VUUU$VUUU
            • API String ID: 0-2165971703
            • Opcode ID: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
            • Instruction ID: 514654dd073cfe12bfc68f6c44a091d7a3824994b709b832431b3f3de6bbd106
            • Opcode Fuzzy Hash: fe5f619ecbbb89e409f3ebcf557090f4afc22d0cdf4dbad8df8e547bb5c0b5b7
            • Instruction Fuzzy Hash: 5562D3716087818BE734CF18C8807ABB7E1EBC6314F154A2FE49986390E779D949CB5B
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
            • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNext
            • String ID:
            • API String ID: 3541575487-0
            • Opcode ID: 436276e02b07ab2fc2fbb9ef65feb62f59ffdb7e44ebd27f42a301b2cca85d53
            • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
            • Opcode Fuzzy Hash: 436276e02b07ab2fc2fbb9ef65feb62f59ffdb7e44ebd27f42a301b2cca85d53
            • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
            APIs
            • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
            • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
            • FindClose.KERNEL32(00000000), ref: 00436B13
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID:
            • API String ID: 48322524-0
            • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
            • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
            • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
            • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
            APIs
            • __time64.LIBCMT ref: 004433A2
              • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
              • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Time$FileSystem__aulldiv__time64
            • String ID: rJ
            • API String ID: 2893107130-1865492326
            • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
            • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
            • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
            • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
            APIs
            • __time64.LIBCMT ref: 004433A2
              • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
              • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Time$FileSystem__aulldiv__time64
            • String ID: rJ
            • API String ID: 2893107130-1865492326
            • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
            • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
            • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
            • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
            APIs
            • InternetQueryDataAvailable.WININET(?,?,?,?), ref: 004428C2
            • InternetReadFile.WININET(?,00000000,?,?), ref: 004428F9
              • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Internet$AvailableDataErrorFileLastQueryRead
            • String ID:
            • API String ID: 901099227-0
            • Opcode ID: c5651eff999419169b46b76971b5abcb261cf656e183e849eb3ab7268b4b60d7
            • Instruction ID: 2c15810e60b1cb59304632cc8162977c32d0240baa2dcf3c2cd6ef22f942a6bb
            • Opcode Fuzzy Hash: c5651eff999419169b46b76971b5abcb261cf656e183e849eb3ab7268b4b60d7
            • Instruction Fuzzy Hash: 452174B12043016BF220EF56DD45FAFB3E8ABD4715F40492EF285A6180D7B8E949C76A
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
            • FindClose.KERNEL32(00000000), ref: 0045DDDD
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
            • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
            • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
            • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: 0vH$HH
            • API String ID: 0-728391547
            • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
            • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
            • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
            • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _memset
            • String ID:
            • API String ID: 2102423945-0
            • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
            • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
            • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
            • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
            APIs
            • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Proc
            • String ID:
            • API String ID: 2346855178-0
            • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
            • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
            • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
            • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
            • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
            • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
            • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
            APIs
            • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
            • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
            • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
            • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
            • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
            • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
            • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
            APIs
            • SetUnhandledExceptionFilter.KERNEL32 ref: 00422033
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
            • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
            • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
            • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
            • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
            • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
            • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
            • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
            • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
            • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
            • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
            • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
            • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
            • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
            • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
            • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
            • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
            • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
            • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
            APIs
            • DeleteObject.GDI32(?), ref: 004593D7
            • DeleteObject.GDI32(?), ref: 004593F1
            • DestroyWindow.USER32 ref: 00459407
            • GetDesktopWindow.USER32 ref: 0045942A
            • GetWindowRect.USER32(00000000), ref: 00459431
            • SetRect.USER32 ref: 00459568
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
            • CreateWindowExW.USER32 ref: 004595BB
            • GetClientRect.USER32(00000000,?,?,50000001,?,?,00000000,00000000,00000000), ref: 004595C8
            • CreateWindowExW.USER32 ref: 00459615
            • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000), ref: 00459635
            • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
            • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
            • GlobalLock.KERNEL32(00000000), ref: 00459668
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00459678
            • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
            • CloseHandle.KERNEL32(00000000), ref: 00459686
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00459694
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
            • GlobalFree.KERNEL32(00000000), ref: 004596C0
            • CopyImage.USER32 ref: 004596EF
            • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 0045973D
            • ShowWindow.USER32(?,00000004), ref: 0045974B
            • CreateWindowExW.USER32 ref: 0045979C
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
            • GetStockObject.GDI32(00000011), ref: 004597B7
            • SelectObject.GDI32(00000000,00000000), ref: 004597BF
            • GetTextFaceW.GDI32(00000000,00000040,00000190), ref: 004597CD
            • GetDeviceCaps.GDI32(00000000,0000005A,?,50000001,?,?,00000000,00000000,00000000), ref: 004597D6
            • DeleteDC.GDI32(00000000), ref: 004597E1
            • _wcslen.LIBCMT ref: 00459800
            • _wcscpy.LIBCMT ref: 0045981F
            • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
            • GetDC.USER32(?), ref: 004598DE
            • SelectObject.GDI32(00000000,?), ref: 004598EE
            • SelectObject.GDI32(00000000,?), ref: 00459919
            • ReleaseDC.USER32(?,00000000), ref: 00459925
            • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
            • ShowWindow.USER32(?,00000004), ref: 00459951
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 4040870279-2373415609
            • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
            • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
            • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
            • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
            APIs
            • GetSysColor.USER32(00000012), ref: 00441E64
            • SetTextColor.GDI32(?,?), ref: 00441E6C
            • GetSysColorBrush.USER32 ref: 00441E83
            • GetSysColor.USER32(0000000F), ref: 00441E8F
            • SetBkColor.GDI32(?,?), ref: 00441EAA
            • SelectObject.GDI32(?,?), ref: 00441EBA
            • InflateRect.USER32 ref: 00441EF0
            • GetSysColor.USER32(00000010), ref: 00441EF8
            • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
            • FrameRect.USER32 ref: 00441F10
            • DeleteObject.GDI32(?), ref: 00441F1B
            • InflateRect.USER32 ref: 00441F75
            • FillRect.USER32 ref: 00441FB6
              • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433D81
              • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
              • Part of subcall function 00433D5C: GetSysColorBrush.USER32 ref: 00433DBF
              • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DCB
              • Part of subcall function 00433D5C: GetSysColor.USER32(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DEB
              • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
              • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
              • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
              • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
              • Part of subcall function 00433D5C: InflateRect.USER32 ref: 00433E54
              • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
              • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
              • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
            • String ID:
            • API String ID: 69173610-0
            • Opcode ID: dce2bc532722d6c978516909a4432b3014f370df0f33642fb727b52a40f95e08
            • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
            • Opcode Fuzzy Hash: dce2bc532722d6c978516909a4432b3014f370df0f33642fb727b52a40f95e08
            • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-3360698832
            • Opcode ID: c74d0d52908dbbec4f5022c33a9c4844136c2b84c95de0bb8b15b994b6f8f789
            • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
            • Opcode Fuzzy Hash: c74d0d52908dbbec4f5022c33a9c4844136c2b84c95de0bb8b15b994b6f8f789
            • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
            APIs
            • GetSysColor.USER32(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433D81
            • SetTextColor.GDI32(?,00000000), ref: 00433D89
            • GetSysColor.USER32(00000012,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DA3
            • SetTextColor.GDI32(?,?), ref: 00433DAB
            • GetSysColorBrush.USER32 ref: 00433DBF
            • GetSysColor.USER32(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DCB
            • CreateSolidBrush.GDI32(?), ref: 00433DD4
            • GetSysColor.USER32(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,00441E27,?), ref: 00433DEB
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
            • SelectObject.GDI32(?,00000000), ref: 00433E0D
            • SetBkColor.GDI32(?,?), ref: 00433E19
            • SelectObject.GDI32(?,?), ref: 00433E29
            • InflateRect.USER32 ref: 00433E54
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
            • GetWindowLongW.USER32 ref: 00433E8A
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
            • GetWindowTextW.USER32(00000000,00000000,00000105,?,?,?,?,?,?,?,?,?,?,00441E27,?,?), ref: 00433EE1
            • InflateRect.USER32 ref: 00433F13
            • DrawFocusRect.USER32 ref: 00433F1F
            • GetSysColor.USER32(00000011), ref: 00433F2E
            • SetTextColor.GDI32(?,00000000), ref: 00433F36
            • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
            • SelectObject.GDI32(?,?), ref: 00433F63
            • DeleteObject.GDI32(?), ref: 00433F70
            • SelectObject.GDI32(?,?), ref: 00433F78
            • DeleteObject.GDI32(00000000), ref: 00433F7B
            • SetTextColor.GDI32(?,?), ref: 00433F83
            • SetBkColor.GDI32(?,?), ref: 00433F8F
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1582027408-0
            • Opcode ID: a1eda0670d83d91c39db8fc211a4c9e6f7ce54e9ebbb7b5317678dee4ec240e8
            • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
            • Opcode Fuzzy Hash: a1eda0670d83d91c39db8fc211a4c9e6f7ce54e9ebbb7b5317678dee4ec240e8
            • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AFC2
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,004848E8,00000000,?,00000000,?,?), ref: 0046B01C
            • RegCloseKey.ADVAPI32(?), ref: 0046B069
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CloseConnectCreateRegistry
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 3217815495-966354055
            • Opcode ID: d34ade7328be694751bfd7b91f64e46c62a8e181ef695d58024fa5586898bbb1
            • Instruction ID: d9d2404220d166b11353d33fb52652cf6d28829cdaa3b272cf204d1a2c990fb8
            • Opcode Fuzzy Hash: d34ade7328be694751bfd7b91f64e46c62a8e181ef695d58024fa5586898bbb1
            • Instruction Fuzzy Hash: 2CE1A1B1600300ABD710EF65C885F1BB7E8AF48704F14895EB945DB392D778E945CBAA
            APIs
            • OpenClipboard.USER32(?), ref: 0046C635
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046C643
            • GetClipboardData.USER32 ref: 0046C64F
            • CloseClipboard.USER32 ref: 0046C65D
            • GlobalLock.KERNEL32(00000000), ref: 0046C688
            • CloseClipboard.USER32 ref: 0046C692
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046C6D5
            • GetClipboardData.USER32 ref: 0046C6DD
            • GlobalLock.KERNEL32(00000000), ref: 0046C6EE
            • GlobalUnlock.KERNEL32(00000000), ref: 0046C726
            • CloseClipboard.USER32 ref: 0046C866
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Clipboard$CloseGlobal$AvailableDataFormatLock$OpenUnlock
            • String ID: HH
            • API String ID: 589737431-2761332787
            • Opcode ID: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
            • Instruction ID: ccec0c76267f611a980a6192e38ed766f4c6ddce8b7f15b38bc446a2cb1d96e7
            • Opcode Fuzzy Hash: 1f8588b948bb152d659cc961560e711d284fc80ef968a1445fa6f6d22cce4332
            • Instruction Fuzzy Hash: 4D61E5722003019BD310EF65DD86B5E77A8EF54715F00483EFA41E72D1EBB5D9048BAA
            APIs
            • GetCursorPos.USER32(?), ref: 00456692
            • GetDesktopWindow.USER32 ref: 004566AA
            • GetWindowRect.USER32(00000000), ref: 004566B1
            • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
            • GetWindowLongW.USER32(?,000000F0), ref: 00456720
            • DestroyWindow.USER32 ref: 00456731
            • CreateWindowExW.USER32 ref: 00456779
            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
            • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
            • IsWindowVisible.USER32(?), ref: 00456812
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
            • GetWindowRect.USER32(?,?), ref: 0045685C
            • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
            • GetMonitorInfoW.USER32 ref: 00456894
            • CopyRect.USER32(?,?), ref: 004568A8
            • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
            • String ID: ($,$tooltips_class32
            • API String ID: 541082891-3320066284
            • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
            • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
            • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
            • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
            APIs
            • _wcslen.LIBCMT ref: 00454DCF
            • _wcslen.LIBCMT ref: 00454DE2
            • __wcsicoll.LIBCMT ref: 00454DEF
            • _wcslen.LIBCMT ref: 00454E04
            • __wcsicoll.LIBCMT ref: 00454E11
            • _wcslen.LIBCMT ref: 00454E24
            • __wcsicoll.LIBCMT ref: 00454E31
              • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
            • LoadImageW.USER32 ref: 00454E65
            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
            • LoadImageW.USER32 ref: 00454EB7
            • LoadImageW.USER32 ref: 00454EFB
            • LoadImageW.USER32 ref: 00454F2C
            • FreeLibrary.KERNEL32(00000000), ref: 00454F37
            • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
            • DestroyIcon.USER32(?), ref: 00454FA2
            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
            • String ID: .dll$.exe$.icl
            • API String ID: 2511167534-1154884017
            • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
            • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
            • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
            • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
            APIs
            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
            • _wcslen.LIBCMT ref: 00436B79
            • _wcscpy.LIBCMT ref: 00436B9F
            • _wcscat.LIBCMT ref: 00436BC0
            • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
            • _wcscat.LIBCMT ref: 00436C2A
            • _wcscat.LIBCMT ref: 00436C31
            • __wcsicoll.LIBCMT ref: 00436C4B
            • _wcsncpy.LIBCMT ref: 00436C62
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
            • API String ID: 1503153545-1459072770
            • Opcode ID: c415717466a75288a316d515b14e5e8f322d0704bbcf92787c1049eb4d752d3b
            • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
            • Opcode Fuzzy Hash: c415717466a75288a316d515b14e5e8f322d0704bbcf92787c1049eb4d752d3b
            • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
            APIs
              • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
            • _fseek.LIBCMT ref: 004527FC
            • __wsplitpath.LIBCMT ref: 0045285C
            • _wcscpy.LIBCMT ref: 00452871
            • _wcscat.LIBCMT ref: 00452886
            • __wsplitpath.LIBCMT ref: 004528B0
            • _wcscat.LIBCMT ref: 004528C8
            • _wcscat.LIBCMT ref: 004528DD
            • __fread_nolock.LIBCMT ref: 00452914
            • __fread_nolock.LIBCMT ref: 00452925
            • __fread_nolock.LIBCMT ref: 00452944
            • __fread_nolock.LIBCMT ref: 00452955
            • __fread_nolock.LIBCMT ref: 00452976
            • __fread_nolock.LIBCMT ref: 00452987
            • __fread_nolock.LIBCMT ref: 00452998
            • __fread_nolock.LIBCMT ref: 004529A9
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
              • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
              • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
            • __fread_nolock.LIBCMT ref: 00452A39
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
            • String ID:
            • API String ID: 2054058615-0
            • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
            • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
            • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
            • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: 0
            • API String ID: 0-4108050209
            • Opcode ID: 05d0114e8ebae6003f4c2574787cb6c924564815b97d0f339d141b1e2ca56e02
            • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
            • Opcode Fuzzy Hash: 05d0114e8ebae6003f4c2574787cb6c924564815b97d0f339d141b1e2ca56e02
            • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
            APIs
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            • GetWindowRect.USER32(?,?), ref: 004701EA
            • GetClientRect.USER32(?,?), ref: 004701FA
            • GetSystemMetrics.USER32(00000007), ref: 00470202
            • GetSystemMetrics.USER32(00000008), ref: 00470216
            • GetSystemMetrics.USER32(00000004), ref: 00470238
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
            • GetSystemMetrics.USER32(00000007), ref: 00470273
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
            • GetSystemMetrics.USER32(00000008), ref: 004702A8
            • GetSystemMetrics.USER32(00000004), ref: 004702CF
            • SetRect.USER32 ref: 004702F1
            • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
            • CreateWindowExW.USER32 ref: 0047033E
            • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
            • GetClientRect.USER32(?,?), ref: 00470371
            • GetStockObject.GDI32(00000011), ref: 00470391
            • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
            • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
            • String ID: AutoIt v3 GUI
            • API String ID: 867697134-248962490
            • Opcode ID: 570e8dd5e49d98c7508f8b782fa1406b772d00bf2db2f5b8a370b42e43a4c94e
            • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
            • Opcode Fuzzy Hash: 570e8dd5e49d98c7508f8b782fa1406b772d00bf2db2f5b8a370b42e43a4c94e
            • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
            APIs
            • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0044880A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window
            • String ID: 0
            • API String ID: 2353593579-4108050209
            • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
            • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
            • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
            • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
            APIs
            • GetSysColor.USER32 ref: 0044A11D
            • GetClientRect.USER32(?,?), ref: 0044A18D
            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
            • GetWindowDC.USER32(?), ref: 0044A1B3
            • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
            • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
            • GetSysColor.USER32(0000000F), ref: 0044A1EC
            • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
            • GetSysColor.USER32(0000000F), ref: 0044A216
            • GetSysColor.USER32(00000005), ref: 0044A21E
            • GetWindowDC.USER32 ref: 0044A277
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
            • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
            • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
            • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
            • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
            • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
            • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
            • GetStockObject.GDI32(00000005), ref: 0044A312
            • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
            • String ID:
            • API String ID: 1744303182-0
            • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
            • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
            • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
            • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsicoll$__wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
            • API String ID: 790654849-1810252412
            • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
            • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
            • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
            • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: >>>AUTOIT SCRIPT<<<$\
            • API String ID: 0-1896584978
            • Opcode ID: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
            • Instruction ID: e6fbcda15cb9520e0e34bfac0f9750edaedb1b44b840e2dcfb1a2c219c195b9a
            • Opcode Fuzzy Hash: 044f2c4ecf877d2b2fc48157703a0e30c53185d3f7c6c17f150f9ffb4993ef22
            • Instruction Fuzzy Hash: 907186B2504300ABC720EB65C885FEBB3E8AF94714F148D1FF58997142E679E648C75A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: InitVariant
            • String ID:
            • API String ID: 1927566239-0
            • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
            • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
            • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
            • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
            APIs
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • GetForegroundWindow.USER32 ref: 0046D7C1
            • GetForegroundWindow.USER32 ref: 0046DBA4
            • IsWindow.USER32(?), ref: 0046DBDE
            • GetDesktopWindow.USER32 ref: 0046DCB5
            • EnumChildWindows.USER32 ref: 0046DCBC
            • EnumWindows.USER32(00460772,?), ref: 0046DCC4
              • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
            • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
            • API String ID: 1322021666-1919597938
            • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
            • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
            • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
            • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
            APIs
            • GetLocalTime.KERNEL32(?), ref: 0045DED4
            • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
            • _wcsncpy.LIBCMT ref: 0045DF0F
            • __wsplitpath.LIBCMT ref: 0045DF54
            • _wcscat.LIBCMT ref: 0045DF6C
            • _wcscat.LIBCMT ref: 0045DF7E
            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
            • _wcscpy.LIBCMT ref: 0045E019
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
            • String ID: *.*
            • API String ID: 3201719729-438819550
            • Opcode ID: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
            • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
            • Opcode Fuzzy Hash: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
            • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsicoll$IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2485277191-404129466
            • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
            • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
            • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
            • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
            APIs
            • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
            • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
            • strncnt.LIBCMT ref: 00428646
            • strncnt.LIBCMT ref: 0042865A
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: strncnt$CompareErrorLastString
            • String ID:
            • API String ID: 1776594460-0
            • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
            • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
            • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
            • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
            APIs
            • LoadIconW.USER32 ref: 004545DA
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
            • SetWindowTextW.USER32(?,?), ref: 00454606
            • GetDlgItem.USER32(?,000003EA), ref: 0045461F
            • SetWindowTextW.USER32(00000000,?), ref: 00454626
            • GetDlgItem.USER32(?,000003E9), ref: 00454637
            • SetWindowTextW.USER32(00000000,?), ref: 0045463E
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
            • GetWindowRect.USER32(?,?), ref: 00454688
            • SetWindowTextW.USER32(?,?), ref: 004546FD
            • GetDesktopWindow.USER32 ref: 00454708
            • GetWindowRect.USER32(00000000), ref: 0045470F
            • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
            • GetClientRect.USER32(?,?), ref: 0045476F
            • PostMessageW.USER32 ref: 0045479E
            • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
            • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
            • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
            • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Cursor$Load$Info
            • String ID:
            • API String ID: 2577412497-0
            • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
            • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
            • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
            • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessagePost$CtrlFocus
            • String ID: 0
            • API String ID: 1534620443-4108050209
            • Opcode ID: e2a32ae154a8fa7b81474ae7b3e79c635657a695f15150dcabcd5e036a6f6ddb
            • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
            • Opcode Fuzzy Hash: e2a32ae154a8fa7b81474ae7b3e79c635657a695f15150dcabcd5e036a6f6ddb
            • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
            • String ID: 0
            • API String ID: 3993528054-4108050209
            • Opcode ID: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
            • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
            • Opcode Fuzzy Hash: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
            • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
            APIs
            • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
              • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
              • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
              • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
            • SendMessageW.USER32(?), ref: 0046F34C
            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
            • _wcscat.LIBCMT ref: 0046F3BC
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
            • DragFinish.SHELL32(?), ref: 0046F414
            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
            • API String ID: 4085615965-3440237614
            • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
            • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
            • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
            • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsicoll
            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
            • API String ID: 3832890014-4202584635
            • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
            • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
            • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
            • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
            APIs
            • _memset.LIBCMT ref: 004669C4
            • _wcsncpy.LIBCMT ref: 00466A21
            • _wcsncpy.LIBCMT ref: 00466A4D
              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
            • _wcstok.LIBCMT ref: 00466A90
              • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
            • _wcstok.LIBCMT ref: 00466B3F
            • _wcscpy.LIBCMT ref: 00466BC8
            • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
            • _wcslen.LIBCMT ref: 00466D1D
            • _memset.LIBCMT ref: 00466BEE
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • _wcslen.LIBCMT ref: 00466D4B
            • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
            • String ID: X$HH
            • API String ID: 3021350936-1944015008
            • Opcode ID: 148ffd08a53066c169799d7010fd2328abbb1436974d200da898f01e024381e3
            • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
            • Opcode Fuzzy Hash: 148ffd08a53066c169799d7010fd2328abbb1436974d200da898f01e024381e3
            • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: InfoItemMenu$Sleep_memset
            • String ID: 0
            • API String ID: 1504565804-4108050209
            • Opcode ID: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
            • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
            • Opcode Fuzzy Hash: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
            • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$CreateDestroy
            • String ID: ,$tooltips_class32
            • API String ID: 1109047481-3856767331
            • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
            • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
            • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
            • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
            APIs
            • _wcsncpy.LIBCMT ref: 0045CCFA
            • __wsplitpath.LIBCMT ref: 0045CD3C
            • _wcscat.LIBCMT ref: 0045CD51
            • _wcscat.LIBCMT ref: 0045CD63
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
              • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
            • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
            • _wcscpy.LIBCMT ref: 0045CE14
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
            • String ID: *.*
            • API String ID: 1153243558-438819550
            • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
            • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
            • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
            • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
            • String ID: 0
            • API String ID: 1663942905-4108050209
            • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
            • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
            • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
            • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
            • String ID:
            • API String ID: 1481289235-0
            • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
            • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
            • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
            • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
            APIs
            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
            • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
            • SendMessageW.USER32 ref: 0046FBAF
            • SendMessageW.USER32 ref: 0046FBE2
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
            • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
            • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
            • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
            • SendMessageW.USER32 ref: 0046FD00
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$IconImageList_$CreateExtractReplace
            • String ID:
            • API String ID: 2632138820-0
            • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
            • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
            • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
            • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CursorLoad
            • String ID:
            • API String ID: 3238433803-0
            • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
            • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
            • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
            • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
            APIs
            • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
            • _wcslen.LIBCMT ref: 00460B00
            • __swprintf.LIBCMT ref: 00460B9E
            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
            • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
            • GetDlgCtrlID.USER32 ref: 00460CE6
            • GetWindowRect.USER32(?,?), ref: 00460D21
            • GetParent.USER32(?), ref: 00460D40
            • ScreenToClient.USER32(00000000), ref: 00460D47
            • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
            • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
            • String ID: %s%u
            • API String ID: 1899580136-679674701
            • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
            • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
            • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
            • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
            APIs
            • CoTaskMemFree.OLE32(?), ref: 0047D6D3
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
            • StringFromIID.OLE32(?,?), ref: 0047D7F0
            • CoTaskMemFree.OLE32(?), ref: 0047D80A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: FreeFromStringTask_wcslen$_wcscpy
            • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
            • API String ID: 2485709727-934586222
            • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
            • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
            • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
            • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
            • String ID: HH
            • API String ID: 3381189665-2761332787
            • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
            • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
            • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
            • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
            APIs
            • GetDC.USER32(00000000), ref: 00434585
            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
            • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
            • SelectObject.GDI32(00000000,?), ref: 004345A9
            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
            • String ID: (
            • API String ID: 3300687185-3887548279
            • Opcode ID: 209e2f7067df3e6dce0ce98e9e91acdecf4b3f60bb8595cd902f19eedb978ee7
            • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
            • Opcode Fuzzy Hash: 209e2f7067df3e6dce0ce98e9e91acdecf4b3f60bb8595cd902f19eedb978ee7
            • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
            • __swprintf.LIBCMT ref: 0045E4D9
            • _printf.LIBCMT ref: 0045E595
            • _printf.LIBCMT ref: 0045E5B7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: LoadString_printf$__swprintf_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
            • API String ID: 3590180749-2894483878
            • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
            • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
            • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
            • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
            APIs
            • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
            • LoadImageW.USER32 ref: 0046F929
            • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
            • DeleteObject.GDI32(?), ref: 0046F950
            • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
            • LoadImageW.USER32 ref: 0046F9A8
            • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
            • DeleteObject.GDI32(?), ref: 0046F9CF
            • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
            • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
            • DestroyIcon.USER32(?), ref: 0046FA4F
            • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
            • DeleteObject.GDI32(?), ref: 0046FA68
            • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
            • String ID:
            • API String ID: 3412594756-0
            • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
            • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
            • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
            • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
            APIs
              • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?), ref: 0045336E
              • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
            • GetDriveTypeW.KERNEL32 ref: 0045DA30
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: SendString$_wcslen$BuffCharDriveLowerType
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 4013263488-4113822522
            • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
            • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
            • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
            • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
            • String ID:
            • API String ID: 228034949-0
            • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
            • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
            • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
            • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
            APIs
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004334F4
            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
            • GlobalLock.KERNEL32(00000000), ref: 00433523
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00433533
            • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
            • CloseHandle.KERNEL32(00000000), ref: 00433541
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0043354F
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
            • GlobalFree.KERNEL32(00000000), ref: 0043357B
            • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
            • CopyImage.USER32 ref: 004335DB
            • DeleteObject.GDI32(?), ref: 00433603
            • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3969911579-0
            • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
            • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
            • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
            • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
            APIs
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045EF6C
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045EF81
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045EF94
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045EFAB
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045EFB8
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045EFD2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: SendString$_wcslen
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 2420728520-1007645807
            • Opcode ID: 2e8e49e05c1f121906b47c7a82fbb4c843ecfb9788746b18ac8014d8855edcbb
            • Instruction ID: e5e6e3524f15ee9b53aa238c1547bf14c0af5fa70a1fb0ad50a0449216793e57
            • Opcode Fuzzy Hash: 2e8e49e05c1f121906b47c7a82fbb4c843ecfb9788746b18ac8014d8855edcbb
            • Instruction Fuzzy Hash: F321A53164830476E220FB51DC87F9E7798AB84B14F200D3BBA407A0D1DBA8E94CC76E
            APIs
            • GetParent.USER32 ref: 00445A8D
            • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
            • __wcsicoll.LIBCMT ref: 00445AC4
            • __wcsicoll.LIBCMT ref: 00445AE0
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsicoll$ClassMessageNameParentSend
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 3125838495-3381328864
            • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
            • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
            • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
            • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CopyVariant$ErrorLast
            • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
            • API String ID: 2286883814-4206948668
            • Opcode ID: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
            • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
            • Opcode Fuzzy Hash: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
            • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
            APIs
              • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?), ref: 0045336E
              • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
            • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
            • _wcscpy.LIBCMT ref: 00475F18
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy_wcslen
            • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
            • API String ID: 3052893215-4176887700
            • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
            • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
            • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
            • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
            APIs
            • StringFromIID.OLE32(?,?), ref: 004582E5
              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • CoTaskMemFree.OLE32(?), ref: 00458335
            • RegOpenKeyExW.ADVAPI32 ref: 00458351
            • RegQueryValueExW.ADVAPI32 ref: 00458381
            • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
            • RegQueryValueExW.ADVAPI32 ref: 004583E8
            • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
              • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
            • RegCloseKey.ADVAPI32(?), ref: 004584BA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
            • String ID: Version$\TypeLib$interface\
            • API String ID: 656856066-939221531
            • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
            • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
            • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
            • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
            • __swprintf.LIBCMT ref: 0045E6EE
            • _printf.LIBCMT ref: 0045E7A9
            • _printf.LIBCMT ref: 0045E7D2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: LoadString_printf$__swprintf_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 3590180749-2354261254
            • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
            • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
            • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
            • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __swprintf_wcscpy$__i64tow__itow
            • String ID: %.15g$0x%p$False$True
            • API String ID: 3038501623-2263619337
            • Opcode ID: 5f8c1c8e91388a45c2c83d9d903153b896fd08d16315a930f67df6de34675593
            • Instruction ID: 2d826072eebb3cc9b8b6a8fde8b9da0ebc7f558755c715a4a51c402ed3db85ba
            • Opcode Fuzzy Hash: 5f8c1c8e91388a45c2c83d9d903153b896fd08d16315a930f67df6de34675593
            • Instruction Fuzzy Hash: 5741E5B2504204ABD700EF35EC06EAB73A4EB95304F04892FFD0997282F67DD619976E
            APIs
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • _memset.LIBCMT ref: 00458194
            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
            • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
            • RegOpenKeyExW.ADVAPI32 ref: 00458219
            • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
            • CLSIDFromString.OLE32(00000000,?), ref: 00458279
            • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
            • RegCloseKey.ADVAPI32(00000000), ref: 00458296
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
            • API String ID: 2255324689-22481851
            • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
            • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
            • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
            • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
            APIs
            • RegOpenKeyExW.ADVAPI32 ref: 00458513
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
            • RegCloseKey.ADVAPI32(?), ref: 00458615
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • RegOpenKeyExW.ADVAPI32 ref: 0045858A
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
            • __wcsicoll.LIBCMT ref: 004585D6
            • IIDFromString.OLE32(?,?), ref: 004585EB
            • RegCloseKey.ADVAPI32(?), ref: 004585F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
            • String ID: ($interface$interface\
            • API String ID: 2231185022-3327702407
            • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
            • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
            • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
            • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
            • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
            • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
            • _wcscpy.LIBCMT ref: 004365F5
            • WSACleanup.WSOCK32 ref: 004365FD
            • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
            • _strcat.LIBCMT ref: 0043662F
            • _wcscpy.LIBCMT ref: 00436644
            • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
            • _wcscpy.LIBCMT ref: 00436666
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 2691793716-3771769585
            • Opcode ID: 65646d0c3f70c30576c3209c49215e1e6413ca059fa52035c9da78ad10046a0d
            • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
            • Opcode Fuzzy Hash: 65646d0c3f70c30576c3209c49215e1e6413ca059fa52035c9da78ad10046a0d
            • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
            • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
              • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
              • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
            • GetProcAddress.KERNEL32(00000000,EncodePointer,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B58
            • GetProcAddress.KERNEL32(00411739,DecodePointer,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B68
            • __lock.LIBCMT ref: 00416B8A
            • InterlockedIncrement.KERNEL32(00EA60FF,?,00411739,00417F28,00413979,?,?,00411739), ref: 00416B97
            • __lock.LIBCMT ref: 00416BAB
            • ___addlocaleref.LIBCMT ref: 00416BC9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
            • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
            • API String ID: 1028249917-2843748187
            • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
            • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
            • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
            • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
            APIs
            • GetSysColorBrush.USER32 ref: 00410326
            • RegisterClassExW.USER32 ref: 00410359
            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
            • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
            • LoadIconW.USER32 ref: 004103B1
            • ImageList_ReplaceIcon.COMCTL32(0094B6A0,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
            • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
            • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
            • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A
            APIs
            • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
            • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
            • CharNextW.USER32(?), ref: 00449361
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
            • SendMessageW.USER32(?,00000402,?), ref: 0044941C
            • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$CharNext
            • String ID:
            • API String ID: 1350042424-0
            • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
            • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
            • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
            • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
            APIs
            • GetKeyboardState.USER32(?), ref: 00453C0D
            • SetKeyboardState.USER32(?), ref: 00453C5A
            • GetAsyncKeyState.USER32 ref: 00453C82
            • GetKeyState.USER32(000000A0), ref: 00453C99
            • GetAsyncKeyState.USER32 ref: 00453CC9
            • GetKeyState.USER32(000000A1), ref: 00453CDA
            • GetAsyncKeyState.USER32 ref: 00453D07
            • GetKeyState.USER32(00000011), ref: 00453D15
            • GetAsyncKeyState.USER32 ref: 00453D3F
            • GetKeyState.USER32(00000012), ref: 00453D4D
            • GetAsyncKeyState.USER32 ref: 00453D77
            • GetKeyState.USER32(0000005B), ref: 00453D85
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
            • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
            • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
            • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 00437DD7
            • GetWindowRect.USER32(00000000,?), ref: 00437DE9
            • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
            • GetDlgItem.USER32(?,00000002), ref: 00437E70
            • GetWindowRect.USER32(00000000,?), ref: 00437E82
            • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
            • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
            • GetWindowRect.USER32(00000000,?), ref: 00437EFC
            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
            • GetDlgItem.USER32(?,000003EA), ref: 00437F55
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
            • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
            • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
            • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
            • String ID:
            • API String ID: 136442275-0
            • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
            • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
            • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
            • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ConnectRegistry_wcslen
            • String ID: HH
            • API String ID: 535477410-2761332787
            • Opcode ID: 494d45e37ad428fecd4b7fac967c7a4690a8e424be50daab94eb1a805ddb89e5
            • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
            • Opcode Fuzzy Hash: 494d45e37ad428fecd4b7fac967c7a4690a8e424be50daab94eb1a805ddb89e5
            • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
            APIs
            • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
            • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
            • _wcslen.LIBCMT ref: 00460502
            • CharUpperBuffW.USER32(?,00000000), ref: 00460510
            • GetClassNameW.USER32(?,?,00000400), ref: 00460589
            • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
            • GetClassNameW.USER32(?,?,00000400), ref: 00460606
            • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
            • GetWindowRect.USER32(?,?), ref: 004606AD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
            • String ID: ThumbnailClass
            • API String ID: 4123061591-1241985126
            • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
            • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
            • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
            • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
            APIs
              • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
              • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
              • Part of subcall function 00456354: GetAsyncKeyState.USER32 ref: 004563D0
              • Part of subcall function 00456354: GetAsyncKeyState.USER32 ref: 004563DC
            • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
            • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
            • ImageList_EndDrag.COMCTL32 ref: 0046F583
            • ReleaseCapture.USER32 ref: 0046F589
            • SetWindowTextW.USER32(?,00000000,?,?,00000000,00000000,?,00000000), ref: 0046F620
            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
            • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
            • API String ID: 2483343779-2060113733
            • Opcode ID: 5127d0ffcd17cb1bef4f2f1971358f36b919fc832d8745dd5c7fc1032c5585dd
            • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
            • Opcode Fuzzy Hash: 5127d0ffcd17cb1bef4f2f1971358f36b919fc832d8745dd5c7fc1032c5585dd
            • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
            APIs
            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
            • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
            • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
            • GetClientRect.USER32(?,?), ref: 0046FEF2
            • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
            • DestroyIcon.USER32(?), ref: 0046FFCC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
            • String ID: 2
            • API String ID: 1331449709-450215437
            • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
            • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
            • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
            • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: static
            • API String ID: 3375834691-2160076837
            • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
            • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
            • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
            • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
            APIs
            • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
            • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
            • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
            • _memcmp.LIBCMT ref: 004394A9
            • CloseHandle.KERNEL32(?), ref: 004394F8
            Strings
            • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
            • SeIncreaseQuotaPrivilege, xrefs: 0043946A
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
            • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
            • API String ID: 1446985595-805462909
            • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
            • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
            • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
            • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D848
            • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
            • API String ID: 2907320926-41864084
            • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
            • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
            • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
            • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
            APIs
            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
            • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046735D
            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
            • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004673ED
            • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
            • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
            • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00467559
            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
            • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
            • SafeArrayUnaccessData.OLEAUT32(CE8B7824,?,?,?,?,?), ref: 004675E4
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID:
            • API String ID: 1932665248-0
            • Opcode ID: 540ab9611df07496c965c6f5b012998b0ae5b601d672a50a0582804279fda95d
            • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
            • Opcode Fuzzy Hash: 540ab9611df07496c965c6f5b012998b0ae5b601d672a50a0582804279fda95d
            • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
            • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
            • _memset.LIBCMT ref: 004481BA
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
            • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
            • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
            • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$LongWindow_memset
            • String ID:
            • API String ID: 830647256-0
            • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
            • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
            • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
            • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
            APIs
              • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
            • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
            • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
            • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
            • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
            • DeleteObject.GDI32(00000000), ref: 0046EB4F
            • DestroyIcon.USER32(00000000), ref: 0046EB67
            • DeleteObject.GDI32(0E602E73), ref: 0046EB7F
            • DestroyWindow.USER32 ref: 0046EB97
            • DestroyIcon.USER32(?), ref: 0046EBBF
            • DestroyIcon.USER32(?), ref: 0046EBCD
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
            • String ID:
            • API String ID: 802431696-0
            • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
            • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
            • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
            • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
            APIs
            • GetKeyboardState.USER32(?), ref: 00444D8A
            • GetAsyncKeyState.USER32 ref: 00444E0F
            • GetKeyState.USER32(000000A0), ref: 00444E26
            • GetAsyncKeyState.USER32 ref: 00444E40
            • GetKeyState.USER32(000000A1), ref: 00444E51
            • GetAsyncKeyState.USER32 ref: 00444E69
            • GetKeyState.USER32(00000011), ref: 00444E77
            • GetAsyncKeyState.USER32 ref: 00444E8F
            • GetKeyState.USER32(00000012), ref: 00444E9D
            • GetAsyncKeyState.USER32 ref: 00444EB5
            • GetKeyState.USER32(0000005B), ref: 00444EC3
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
            • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
            • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
            • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: HH
            • API String ID: 0-2761332787
            • Opcode ID: 9f3a2665df019714f0744ddd647493bec623add609b0b214ee0a4c07b146d389
            • Instruction ID: 1932890218e454eaab518c2d08cf67ea4bcb6b95680f1d85a47b5a5cee1eebd3
            • Opcode Fuzzy Hash: 9f3a2665df019714f0744ddd647493bec623add609b0b214ee0a4c07b146d389
            • Instruction Fuzzy Hash: 99A1A1726043009BD710EF65DC82B6BB3E9ABD4718F008E2EF558E7281D779E9448B5A
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
            • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004508FC
            • _wcslen.LIBCMT ref: 00450944
            • _wcscat.LIBCMT ref: 00450955
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
            • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat_wcslen
            • String ID: -----$SysListView32
            • API String ID: 4008455318-3975388722
            • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
            • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
            • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
            • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
            • String ID: 0
            • API String ID: 176399719-4108050209
            • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
            • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
            • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
            • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
            • GetDlgCtrlID.USER32 ref: 00469289
            • GetParent.USER32 ref: 004692A4
            • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
            • GetDlgCtrlID.USER32 ref: 004692AE
            • GetParent.USER32 ref: 004692C7
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent$_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 2040099840-1403004172
            • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
            • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
            • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
            • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
            • GetDlgCtrlID.USER32 ref: 00469483
            • GetParent.USER32 ref: 0046949E
            • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
            • GetDlgCtrlID.USER32 ref: 004694A8
            • GetParent.USER32 ref: 004694C1
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent$_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 2040099840-1403004172
            • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
            • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
            • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
            • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
            APIs
              • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
            • SendMessageW.USER32(750A0E13,00001001,00000000,00000000), ref: 00448E73
            • SendMessageW.USER32(750A0E13,00001026,00000000,00000000), ref: 00448E7E
              • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$BrushCreateDeleteObjectSolid
            • String ID:
            • API String ID: 3771399671-0
            • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
            • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
            • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
            • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: InitVariant$_malloc_wcscpy_wcslen
            • String ID:
            • API String ID: 3413494760-0
            • Opcode ID: 3e576700eaa120b4cc2728f51a198fd447c15b227df8d5eef1ac6b7d3da7ef95
            • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
            • Opcode Fuzzy Hash: 3e576700eaa120b4cc2728f51a198fd447c15b227df8d5eef1ac6b7d3da7ef95
            • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
            APIs
            • GetCurrentThreadId.KERNEL32(?,?,?,?,0045FDE0,?,?,00000001), ref: 004377D7
            • GetForegroundWindow.USER32 ref: 004377EB
            • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00437809
            • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043782E
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 0043783D
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 0043788D
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004378A1
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004378AC
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
            • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
            • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
            • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsicoll
            • String ID: 0%d$DOWN$OFF
            • API String ID: 3832890014-468733193
            • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
            • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
            • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
            • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
            APIs
            • VariantInit.OLEAUT32(00000000), ref: 0045E959
            • VariantCopy.OLEAUT32(00000000), ref: 0045E963
            • VariantClear.OLEAUT32 ref: 0045E970
            • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
            • __swprintf.LIBCMT ref: 0045EB1F
            • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
            • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
            Strings
            • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
            • String ID: %4d%02d%02d%02d%02d%02d
            • API String ID: 43541914-1568723262
            • Opcode ID: babf121c1f21bd7c9f5b22c45122f4cf13babb3f4a346428986e0a82870c9096
            • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
            • Opcode Fuzzy Hash: babf121c1f21bd7c9f5b22c45122f4cf13babb3f4a346428986e0a82870c9096
            • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
            APIs
            • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
            • Sleep.KERNEL32(0000000A), ref: 0042FE6E
            • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DecrementInterlocked$Sleep
            • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
            • API String ID: 2250217261-3412429629
            • Opcode ID: 7d20af892ce27232a3ff337619be48fed7d74e1bde2de334c7b49ab88d15dd8c
            • Instruction ID: 990b5f35a06538e4ae7b6c94f393f4a5fafaaf51bfa382c75dcb300f2d234fa3
            • Opcode Fuzzy Hash: 7d20af892ce27232a3ff337619be48fed7d74e1bde2de334c7b49ab88d15dd8c
            • Instruction Fuzzy Hash: E0B1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
            • API String ID: 0-1603158881
            • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
            • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
            • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
            • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
            APIs
            • _memset.LIBCMT ref: 00479D1F
            • VariantInit.OLEAUT32(?), ref: 00479F06
            • VariantClear.OLEAUT32(?), ref: 00479F11
            • VariantInit.OLEAUT32(?), ref: 00479DF7
              • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
              • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
              • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
            • VariantClear.OLEAUT32(?), ref: 00479F9C
              • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Variant$Copy$ClearInit$ErrorLast_memset
            • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
            • API String ID: 665237470-60002521
            • Opcode ID: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
            • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
            • Opcode Fuzzy Hash: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
            • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ConnectRegistry_wcslen
            • String ID: HH
            • API String ID: 535477410-2761332787
            • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
            • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
            • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
            • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
            • String ID: 0$2
            • API String ID: 3311875123-3793063076
            • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
            • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
            • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
            • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
            APIs
            • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\Desktop\Proforma Invoice_pdf.exe), ref: 0043719E
            • LoadStringW.USER32(00000000), ref: 004371A7
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
            • LoadStringW.USER32(00000000), ref: 004371C0
            • _printf.LIBCMT ref: 004371EC
            • MessageBoxW.USER32 ref: 00437208
            Strings
            • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
            • C:\Users\user\Desktop\Proforma Invoice_pdf.exe, xrefs: 00437189
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_printf
            • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\Proforma Invoice_pdf.exe
            • API String ID: 220974073-1758421845
            • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
            • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
            • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
            • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
            • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
            • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
            • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
            APIs
              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,?,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,004A8E80,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,0040F3D2), ref: 0040FFCA
              • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
            • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
            • MoveFileW.KERNEL32 ref: 0045358E
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: File$AttributesFullMoveNamePathlstrcmpi
            • String ID:
            • API String ID: 978794511-0
            • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
            • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
            • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
            • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
            • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
            • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
            • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
            APIs
            • GetWindowLongW.USER32(?,000000EC), ref: 00455F01
            • _memset.LIBCMT ref: 00455F12
            • SendMessageW.USER32 ref: 00455F43
            • SendMessageW.USER32(?,0000104B,00000000,?), ref: 00455F82
            • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00455FF5
            • _wcslen.LIBCMT ref: 00455FFC
            • _wcslen.LIBCMT ref: 00456018
            • CharNextW.USER32(00000000), ref: 00456034
            • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00456060
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$_wcslen$CharLongNextWindow_memset
            • String ID:
            • API String ID: 2321321212-0
            • Opcode ID: 56a67735f7a5bb8cc0a1c357c9749c25dc37e6f8b8df9cef775033d7e934ef4e
            • Instruction ID: 728fd5b54b682decfcd50b06f9b7fb359c8698431e162ed45c662fcf507213b6
            • Opcode Fuzzy Hash: 56a67735f7a5bb8cc0a1c357c9749c25dc37e6f8b8df9cef775033d7e934ef4e
            • Instruction Fuzzy Hash: 5D41D172204241ABE3108F68DC45BABB7E4FB84321F004A2EF954D72D1E7B9904A8B66
            APIs
              • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
              • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32(00000000,?,00000001,00478FA7), ref: 00445964
              • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001), ref: 0044596B
            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
            • PostMessageW.USER32 ref: 00445D35
            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
            • PostMessageW.USER32 ref: 00445D66
            • Sleep.KERNEL32(00000000), ref: 00445D70
            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
            • PostMessageW.USER32 ref: 00445D8B
            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
            • String ID:
            • API String ID: 2014098862-0
            • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
            • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
            • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
            • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressProc_malloc$_strcat_strlen
            • String ID: AU3_FreeVar
            • API String ID: 2184576858-771828931
            • Opcode ID: 111e65442873bd7cbffe48700b84114c079de58427b558a04ef4a5d95244f0f0
            • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
            • Opcode Fuzzy Hash: 111e65442873bd7cbffe48700b84114c079de58427b558a04ef4a5d95244f0f0
            • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
            APIs
            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
            • DestroyWindow.USER32 ref: 0042A751
            • UnregisterHotKey.USER32(?), ref: 0042A778
            • FreeLibrary.KERNEL32(?), ref: 0042A822
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
            • String ID: close all
            • API String ID: 4174999648-3243417748
            • Opcode ID: ddf39f1eda455a1c63d5a7d3271f56cd3ed42d138f3b783cbb3ca1597947a384
            • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
            • Opcode Fuzzy Hash: ddf39f1eda455a1c63d5a7d3271f56cd3ed42d138f3b783cbb3ca1597947a384
            • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
            • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
            • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
              • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
            • String ID:
            • API String ID: 1291720006-3916222277
            • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
            • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
            • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
            • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorLastselect
            • String ID: HH
            • API String ID: 215497628-2761332787
            • Opcode ID: 38832bdf1c2d69764463c59b4ea3e323505be882b78fbcfb165a57a5b6e27ccc
            • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
            • Opcode Fuzzy Hash: 38832bdf1c2d69764463c59b4ea3e323505be882b78fbcfb165a57a5b6e27ccc
            • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __snwprintf__wcsicoll_wcscpy
            • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
            • API String ID: 1729044348-3708979750
            • Opcode ID: d504a39e3b85aa042b454773e4b791f90fae78cdff70d0edbc70f8b40f51964b
            • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
            • Opcode Fuzzy Hash: d504a39e3b85aa042b454773e4b791f90fae78cdff70d0edbc70f8b40f51964b
            • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
            APIs
              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,?,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,004A8E80,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,0040F3D2), ref: 0040FFCA
            • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
            • MoveFileW.KERNEL32 ref: 0044BC38
            • _wcscat.LIBCMT ref: 0044BCAA
            • _wcslen.LIBCMT ref: 0044BCB7
            • _wcslen.LIBCMT ref: 0044BCCB
            • SHFileOperationW.SHELL32 ref: 0044BD16
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
            • String ID: \*.*
            • API String ID: 2326526234-1173974218
            • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
            • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
            • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
            • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
            APIs
              • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
            • _wcslen.LIBCMT ref: 004366DD
            • GetFileAttributesW.KERNEL32(?), ref: 00436700
            • GetLastError.KERNEL32 ref: 0043670F
            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
            • _wcsrchr.LIBCMT ref: 0043674C
              • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
            • String ID: \
            • API String ID: 321622961-2967466578
            • Opcode ID: 3d3187412736f1559758a6cd6e40f0a594bd5d43c4c9ea1cccac3023e941b0f8
            • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
            • Opcode Fuzzy Hash: 3d3187412736f1559758a6cd6e40f0a594bd5d43c4c9ea1cccac3023e941b0f8
            • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: dc7e98e38d8725b7134af3b864f32bf76aed1b78794146943df9d66deb8fb3e7
            • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
            • Opcode Fuzzy Hash: dc7e98e38d8725b7134af3b864f32bf76aed1b78794146943df9d66deb8fb3e7
            • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
            APIs
            • EnumProcesses.PSAPI(?,00000800,?,?,00444263,?,?,?), ref: 00436EEC
            • OpenProcess.KERNEL32(00000410,00000000,?,?,?), ref: 00436F44
            • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00436F59
            • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104,00000000,?,00000004,?), ref: 00436F71
            • __wsplitpath.LIBCMT ref: 00436FA0
            • _wcscat.LIBCMT ref: 00436FB2
            • __wcsicoll.LIBCMT ref: 00436FC4
            • CloseHandle.KERNEL32(00000000), ref: 00437003
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
            • String ID:
            • API String ID: 2903788889-0
            • Opcode ID: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
            • Instruction ID: e95795bff0e4a6f47310c77509a1ee8dff79588992f1933afd8058d7896a4498
            • Opcode Fuzzy Hash: 7292045517b03260f1320f87d3cebc28a29f897dca793e666df8b3a842c294cc
            • Instruction Fuzzy Hash: C831A5B5108341ABD725DF54D881EEF73E8BBC8704F00891EF6C587241DBB9AA89C766
            APIs
            • DeleteObject.GDI32(?), ref: 0044157D
            • GetDC.USER32(00000000), ref: 00441585
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
            • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
            • String ID:
            • API String ID: 3864802216-0
            • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
            • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
            • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
            • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 004140E1
              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
            • ___fls_getvalue@4.LIBCMT ref: 004140EC
              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
            • ___fls_setvalue@8.LIBCMT ref: 004140FF
              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
            • ExitThread.KERNEL32 ref: 0041410F
            • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00414115
            • __freefls@4.LIBCMT ref: 00414135
            • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 1925773019-0
            • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
            • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
            • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
            • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
            APIs
            • VariantClear.OLEAUT32(00000038), ref: 004357C3
            • VariantClear.OLEAUT32(00000058), ref: 004357C9
            • VariantClear.OLEAUT32(00000068), ref: 004357CF
            • VariantClear.OLEAUT32(00000078), ref: 004357D5
            • VariantClear.OLEAUT32(00000088), ref: 004357DE
            • VariantClear.OLEAUT32(00000048), ref: 004357E4
            • VariantClear.OLEAUT32(00000098), ref: 004357ED
            • VariantClear.OLEAUT32(000000A8), ref: 004357F6
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
            • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
            • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
            • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
            APIs
            • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
              • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
            • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
            • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
            • _memset.LIBCMT ref: 00464B92
            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
            • GlobalFree.KERNEL32(00000000), ref: 00464CDE
            • WSACleanup.WSOCK32 ref: 00464CE4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
            • String ID:
            • API String ID: 3424476444-0
            • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
            • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
            • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
            • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
            APIs
            • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MetricsSystem
            • String ID:
            • API String ID: 4116985748-0
            • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
            • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
            • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
            • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ConnectRegistry_wcslen
            • String ID:
            • API String ID: 535477410-0
            • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
            • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
            • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
            • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
            APIs
              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
            • _memset.LIBCMT ref: 004538C4
            • GetMenuItemInfoW.USER32 ref: 004538EF
            • _wcslen.LIBCMT ref: 00453960
            • SetMenuItemInfoW.USER32 ref: 004539C4
            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 004539E0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
            • String ID: 0
            • API String ID: 3530711334-4108050209
            • Opcode ID: f8b7da67bd46f6d3acaa256ed113b1c9c09b209eebf999d73fbf05c6f83275f6
            • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
            • Opcode Fuzzy Hash: f8b7da67bd46f6d3acaa256ed113b1c9c09b209eebf999d73fbf05c6f83275f6
            • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
            APIs
            • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
            • CloseHandle.KERNEL32(00000000), ref: 00473C01
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process$CloseCountersCurrentHandleOpen
            • String ID: HH
            • API String ID: 3488606520-2761332787
            • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
            • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
            • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
            • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
            APIs
              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
            • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
            • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
            • LineTo.GDI32(?,?), ref: 004474BF
            • CloseFigure.GDI32(?), ref: 004474C6
            • SetPixel.GDI32(?,?,?,?), ref: 004474D6
            • Rectangle.GDI32(?,?), ref: 004474F3
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
            • String ID:
            • API String ID: 4082120231-0
            • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
            • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
            • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
            • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
            APIs
              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
            • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
            • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
            • LineTo.GDI32(?,?), ref: 004474BF
            • CloseFigure.GDI32(?), ref: 004474C6
            • SetPixel.GDI32(?,?,?,?), ref: 004474D6
            • Rectangle.GDI32(?,?), ref: 004474F3
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
            • String ID:
            • API String ID: 4082120231-0
            • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
            • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
            • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
            • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
            • String ID:
            • API String ID: 288456094-0
            • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
            • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
            • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
            • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
            • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
            • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
            • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
            • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
            • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
            • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
            • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
            • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
            • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ConnectRegistry_wcslen
            • String ID: HH
            • API String ID: 535477410-2761332787
            • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
            • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
            • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
            • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
            APIs
            • _memset.LIBCMT ref: 00457C34
            • _memset.LIBCMT ref: 00457CE8
            • ShellExecuteExW.SHELL32(?), ref: 00457D34
              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
            • CloseHandle.KERNEL32(?), ref: 00457DDD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
            • String ID: <$@
            • API String ID: 1325244542-1426351568
            • Opcode ID: 669f3797eafbd6ea24f738bceaf78c3ad3f6bdf3b3f8ec2a74c9f7251b65f49f
            • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
            • Opcode Fuzzy Hash: 669f3797eafbd6ea24f738bceaf78c3ad3f6bdf3b3f8ec2a74c9f7251b65f49f
            • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 0047379B
            • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
            • __wsplitpath.LIBCMT ref: 004737E1
              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
            • _wcscat.LIBCMT ref: 004737F6
            • __wcsicoll.LIBCMT ref: 00473818
            • Process32NextW.KERNEL32(00000000,?), ref: 00473844
            • CloseHandle.KERNEL32(00000000), ref: 00473852
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 2547909840-0
            • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
            • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
            • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
            • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
            APIs
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
            • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
            • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
            • DeleteObject.GDI32(?), ref: 0045564E
            • DeleteObject.GDI32(?), ref: 0045565C
            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
            • DestroyWindow.USER32 ref: 00455678
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
            • String ID:
            • API String ID: 2354583917-0
            • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
            • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
            • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
            • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
            APIs
              • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
            • GetMenu.USER32(?,?,?,00000001,?,?,?,?), ref: 004776AA
            • GetMenuItemCount.USER32(00000000), ref: 004776CC
            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
            • _wcslen.LIBCMT ref: 0047771A
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$CountItemStringWindow_wcslen
            • String ID:
            • API String ID: 1823500076-0
            • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
            • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
            • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
            • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
            APIs
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
            • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
            • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
            • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageMoveSend
            • String ID:
            • API String ID: 896007046-0
            • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
            • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
            • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
            • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
            APIs
            • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
            • GetWindowLongW.USER32(?,000000F0), ref: 00441452
            • GetWindowLongW.USER32(?,000000F0), ref: 00441493
            • SendMessageW.USER32(0020DD58,000000F1,00000000,00000000), ref: 004414C6
            • SendMessageW.USER32(0020DD58,000000F1,00000001,00000000), ref: 004414F1
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
            • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
            • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
            • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$Item$DrawInfoInsert_memset
            • String ID: 0
            • API String ID: 3866635326-4108050209
            • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
            • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
            • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
            • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
            APIs
            • InterlockedIncrement.KERNEL32 ref: 0047247C
            • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
            • Sleep.KERNEL32(0000000A), ref: 00472499
            • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
            • InterlockedDecrement.KERNEL32(004A7CAC,?,?,?,?), ref: 00472599
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$Sleep
            • String ID: 0vH
            • API String ID: 327565842-3662162768
            • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
            • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
            • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
            • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
            APIs
            • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
            • GetFocus.USER32(?,00000401,?,00000000), ref: 00448B1C
            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
            • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
            • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Enable$Show$FocusMessageSend
            • String ID:
            • API String ID: 3429747543-0
            • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
            • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
            • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
            • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
            APIs
            • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • _memset.LIBCMT ref: 00401C62
            • _wcsncpy.LIBCMT ref: 00401CA1
            • _wcscpy.LIBCMT ref: 00401CBD
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
            • String ID: Line:
            • API String ID: 1620655955-1585850449
            • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
            • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
            • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
            • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
            • GetVolumeInformationW.KERNEL32 ref: 0045D3B3
            • __swprintf.LIBCMT ref: 0045D3CC
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu$HH
            • API String ID: 3164766367-3924996404
            • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
            • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
            • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
            • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
            APIs
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
            • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
            • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Msctls_Progress32
            • API String ID: 3850602802-3636473452
            • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
            • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
            • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
            • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
            • String ID:
            • API String ID: 3985565216-0
            • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
            • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
            • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
            • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00415737
            • __calloc_crt.LIBCMT ref: 00415743
            • __getptd.LIBCMT ref: 00415750
            • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
            • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
            • __dosmaperr.LIBCMT ref: 004157A9
              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
            • String ID:
            • API String ID: 1269668773-0
            • Opcode ID: 67dce5b71fba5b2bc579f619b30886b4133a6035229b30961222ec1983ea5d94
            • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
            • Opcode Fuzzy Hash: 67dce5b71fba5b2bc579f619b30886b4133a6035229b30961222ec1983ea5d94
            • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
            APIs
              • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
              • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
            • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
            • DuplicateHandle.KERNEL32 ref: 0043912C
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
            • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
            • DuplicateHandle.KERNEL32 ref: 00439145
            • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
            • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
            • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
            • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00415690
              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
            • ___fls_getvalue@4.LIBCMT ref: 0041569B
              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
            • ___fls_setvalue@8.LIBCMT ref: 004156AD
              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
            • ExitThread.KERNEL32 ref: 004156BD
            • __freefls@4.LIBCMT ref: 004156D9
            • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 4166825349-0
            • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
            • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
            • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
            • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00434134
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
            • API String ID: 2574300362-3261711971
            • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
            • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
            • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
            • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
            • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
            • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
            • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
            APIs
            • GetClientRect.USER32(?,?,00000000,FFFFFFFF,00000000,?), ref: 00433724
            • GetWindowRect.USER32(00000000,?), ref: 00433757
            • GetClientRect.USER32(0000001D,?,00000000,FFFFFFFF,00000000,?), ref: 004337AC
            • GetSystemMetrics.USER32(0000000F), ref: 00433800
            • GetWindowRect.USER32(?,?), ref: 00433814
            • ScreenToClient.USER32(?,?), ref: 00433842
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Rect$Client$Window$MetricsScreenSystem
            • String ID:
            • API String ID: 3220332590-0
            • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
            • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
            • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
            • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _malloc_wcslen$_strcat_wcscpy
            • String ID:
            • API String ID: 1612042205-0
            • Opcode ID: de2929fcda50375e6e5cb9f1075b8832783a078aa1feca3c1cc6154b42d84a61
            • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
            • Opcode Fuzzy Hash: de2929fcda50375e6e5cb9f1075b8832783a078aa1feca3c1cc6154b42d84a61
            • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$InputSend
            • String ID:
            • API String ID: 2221674350-0
            • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
            • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
            • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
            • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcscpy$_wcscat
            • String ID:
            • API String ID: 2037614760-0
            • Opcode ID: f99e136c889cacb8689bc9f00eee4ad51686cf745bff212a4790763dd87d00cb
            • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
            • Opcode Fuzzy Hash: f99e136c889cacb8689bc9f00eee4ad51686cf745bff212a4790763dd87d00cb
            • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
            APIs
            • BeginPaint.USER32(00000000,?), ref: 00447B9D
            • GetWindowRect.USER32(?,?), ref: 00447C1B
            • ScreenToClient.USER32(?,?), ref: 00447C39
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
            • EndPaint.USER32(?,?), ref: 00447CD1
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 4189319755-0
            • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
            • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
            • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
            • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
            • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
            • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID:
            • API String ID: 1726766782-0
            • Opcode ID: 83222f4c63df7e997ce5feac3b83dd155efb879fc6a19bdc36499811ac613e1e
            • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
            • Opcode Fuzzy Hash: 83222f4c63df7e997ce5feac3b83dd155efb879fc6a19bdc36499811ac613e1e
            • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
            APIs
            • ShowWindow.USER32(?,00000000), ref: 004410F9
            • EnableWindow.USER32(?,00000000), ref: 0044111A
            • ShowWindow.USER32(?,00000000), ref: 00441183
            • ShowWindow.USER32(?,00000004), ref: 00441192
            • EnableWindow.USER32(?,00000001), ref: 004411B3
            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
            • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
            • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
            • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
            APIs
            • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
            • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
            • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$LongWindow$InvalidateRect
            • String ID:
            • API String ID: 1976402638-0
            • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
            • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
            • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
            • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
            APIs
            • GetForegroundWindow.USER32 ref: 00442597
              • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
            • GetDesktopWindow.USER32 ref: 004425BF
            • GetWindowRect.USER32(00000000), ref: 004425C6
            • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
              • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
            • GetCursorPos.USER32(?), ref: 00442624
            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
            • String ID:
            • API String ID: 4137160315-0
            • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
            • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
            • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
            • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
            APIs
            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
            • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
            • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageSend
            • String ID:
            • API String ID: 1871949834-0
            • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
            • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
            • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
            • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
            APIs
            • _memset.LIBCMT ref: 0044961A
            • SendMessageW.USER32 ref: 0044964A
              • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
            • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
            • _wcslen.LIBCMT ref: 004496BA
            • _wcslen.LIBCMT ref: 004496C7
            • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$_wcslen$_memset_wcspbrk
            • String ID:
            • API String ID: 1624073603-0
            • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
            • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
            • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
            • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
            • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
            • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
            • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DestroyWindow$DeleteObject$IconMove
            • String ID:
            • API String ID: 1640429340-0
            • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
            • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
            • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
            • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __fileno__setmode$DebugOutputString_fprintf
            • String ID:
            • API String ID: 3354276064-0
            • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
            • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
            • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
            • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Destroy$DeleteMenuObject$IconWindow
            • String ID:
            • API String ID: 752480666-0
            • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
            • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
            • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
            • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
            • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
            • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
            • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
            APIs
            • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
            • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
            • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
            • CloseHandle.KERNEL32(?), ref: 00439383
            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
            • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
            • String ID:
            • API String ID: 1413079979-0
            • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
            • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
            • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
            • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 0041418F
            • __calloc_crt.LIBCMT ref: 0041419B
            • __getptd.LIBCMT ref: 004141A8
            • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
            • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
            • __dosmaperr.LIBCMT ref: 00414201
              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
            • String ID:
            • API String ID: 1803633139-0
            • Opcode ID: e16809dd055500cc9d55e52b2a8bb0d222df9b3cc731a1ba011baabe8b5c6d4f
            • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
            • Opcode Fuzzy Hash: e16809dd055500cc9d55e52b2a8bb0d222df9b3cc731a1ba011baabe8b5c6d4f
            • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
            • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
            • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
            • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
            APIs
            • SendMessageW.USER32 ref: 004554DF
            • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
            • DeleteObject.GDI32(?), ref: 0045564E
            • DeleteObject.GDI32(?), ref: 0045565C
            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
            • DestroyWindow.USER32 ref: 00455678
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconWindow
            • String ID:
            • API String ID: 3691411573-0
            • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
            • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
            • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
            • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcslen$_wcstok$ExtentPoint32Text
            • String ID:
            • API String ID: 1814673581-0
            • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
            • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
            • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
            • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
            APIs
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
            • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
            • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
            • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
            APIs
              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
            • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
            • LineTo.GDI32(?,?,?), ref: 00447227
            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
            • LineTo.GDI32(?,?,?), ref: 0044723D
            • EndPath.GDI32(?), ref: 0044724E
            • StrokePath.GDI32(?), ref: 0044725C
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
            • String ID:
            • API String ID: 372113273-0
            • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
            • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
            • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
            • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
            • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
            • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
            • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
            APIs
            • GetDC.USER32(00000000), ref: 0044CBEF
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
            • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
            • MulDiv.KERNEL32 ref: 0044CC29
            • MulDiv.KERNEL32 ref: 0044CC37
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CapsDevice$Release
            • String ID:
            • API String ID: 1035833867-0
            • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
            • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
            • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
            • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
            APIs
            • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
            • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
            • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
            • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
              • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000), ref: 004356D9
            • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
            • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
            • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
            • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
            • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
            APIs
            • PostMessageW.USER32 ref: 00437127
            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
            • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
            • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
            • CloseHandle.KERNEL32(00000000), ref: 00437174
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
            • String ID:
            • API String ID: 839392675-0
            • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
            • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
            • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
            • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
            APIs
            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,00000004), ref: 00436055
            • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
            • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
            • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
            • GetLastError.KERNEL32 ref: 00436081
            • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
            • String ID:
            • API String ID: 1690418490-0
            • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
            • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
            • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
            • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
            APIs
              • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
            • CoInitialize.OLE32(00000000), ref: 00475B71
            • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
            • CoUninitialize.OLE32 ref: 00475D71
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk$HH
            • API String ID: 886957087-3121654589
            • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
            • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
            • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
            • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem_memset
            • String ID: 0
            • API String ID: 1173514356-4108050209
            • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
            • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
            • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
            • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 763830540-1403004172
            • Opcode ID: 5d0a2c71db6aade5b96b23b3bd4061acea82ce6bbdfd8ce7b1b84c9309f98e76
            • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
            • Opcode Fuzzy Hash: 5d0a2c71db6aade5b96b23b3bd4061acea82ce6bbdfd8ce7b1b84c9309f98e76
            • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
            APIs
            • GetStdHandle.KERNEL32(?), ref: 004439B4
              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,756F13E0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
              • Part of subcall function 0043569D: DuplicateHandle.KERNEL32 ref: 004356C4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CurrentHandleProcess$Duplicate
            • String ID: nul
            • API String ID: 2124370227-2873401336
            • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
            • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
            • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
            • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,756F13E0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
              • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
              • Part of subcall function 0043569D: DuplicateHandle.KERNEL32 ref: 004356C4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CurrentHandleProcess$Duplicate
            • String ID: nul
            • API String ID: 2124370227-2873401336
            • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
            • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
            • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
            • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
            APIs
            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
            • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
            • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
            • DestroyWindow.USER32 ref: 0044135B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$DestroyLibraryLoadWindow
            • String ID: SysAnimate32
            • API String ID: 3529120543-1011021900
            • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
            • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
            • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
            • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
            APIs
            • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
            • TranslateMessage.USER32(?), ref: 0044308B
            • DispatchMessageW.USER32(?), ref: 00443096
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Message$Peek$DispatchTranslate
            • String ID: *.*
            • API String ID: 1795658109-438819550
            • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
            • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
            • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
            • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
            APIs
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
              • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
              • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
              • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32(00000000), ref: 004389DA
              • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
            • GetFocus.USER32(?,00000001,004848E8,004848E8,?), ref: 004609EF
              • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
              • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
            • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
            • EnumChildWindows.USER32 ref: 00460A60
            • __swprintf.LIBCMT ref: 00460A7A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
            • String ID: %s%d
            • API String ID: 991886796-1110647743
            • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
            • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
            • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
            • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _memset$_sprintf
            • String ID: %02X
            • API String ID: 891462717-436463671
            • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
            • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
            • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
            • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
            APIs
            • _memset.LIBCMT ref: 0042CD00
            • GetOpenFileNameW.COMDLG32 ref: 0042CD51
              • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,?,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,004A8E80,C:\Users\user\Desktop\Proforma Invoice_pdf.exe,0040F3D2), ref: 0040FFCA
              • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
              • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?), ref: 00410150
              • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
              • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
              • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
              • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
            • String ID: $OH$@OH$X
            • API String ID: 3491138722-1394974532
            • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
            • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
            • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
            • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
            APIs
            • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
            • GetProcAddress.KERNEL32(?,?,?,?,?), ref: 00463E68
            • GetProcAddress.KERNEL32(?,00000000,?), ref: 00463E84
            • GetProcAddress.KERNEL32(?,?,?,?,00000041,?,?,00000000,?), ref: 00463ECE
            • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressProc$Library$FreeLoad
            • String ID:
            • API String ID: 2449869053-0
            • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
            • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
            • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
            • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: KeyboardMessagePostState$InputSend
            • String ID:
            • API String ID: 3031425849-0
            • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
            • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
            • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
            • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
            APIs
            • RegEnumKeyExW.ADVAPI32 ref: 004422F0
            • RegOpenKeyExW.ADVAPI32 ref: 0044232B
            • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
            • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Enum$CloseDeleteOpen
            • String ID:
            • API String ID: 2095303065-0
            • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
            • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
            • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
            • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
            APIs
            • GetPrivateProfileSectionW.KERNEL32 ref: 0045C2F4
            • GetPrivateProfileSectionW.KERNEL32 ref: 0045C31B
            • WritePrivateProfileSectionW.KERNEL32 ref: 0045C363
            • WritePrivateProfileStringW.KERNEL32 ref: 0045C385
            • WritePrivateProfileStringW.KERNEL32 ref: 0045C392
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String
            • String ID:
            • API String ID: 2832842796-0
            • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
            • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
            • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
            • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
            APIs
            • GetClientRect.USER32(?,?,004A83D8,?), ref: 00447997
            • GetCursorPos.USER32(?), ref: 004479A2
            • ScreenToClient.USER32(?,?), ref: 004479BE
            • WindowFromPoint.USER32 ref: 004479FF
            • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Client$CursorFromPointProcRectScreenWindow
            • String ID:
            • API String ID: 1822080540-0
            • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
            • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
            • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
            • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
            APIs
            • GetWindowRect.USER32(?,?), ref: 00447C1B
            • ScreenToClient.USER32(?,?), ref: 00447C39
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
            • EndPaint.USER32(?,?), ref: 00447CD1
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ClientPaintRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 659298297-0
            • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
            • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
            • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
            • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
            APIs
            • GetCursorPos.USER32(?), ref: 004478A7
            • TrackPopupMenuEx.USER32 ref: 004478C3
            • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
            • GetCursorPos.USER32(?), ref: 00447935
            • TrackPopupMenuEx.USER32 ref: 0044795B
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CursorMenuPopupTrack$Proc
            • String ID:
            • API String ID: 1300944170-0
            • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
            • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
            • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
            • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
            APIs
            • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
            • ShowWindow.USER32(004A83D8,00000000), ref: 00448C37
            • ShowWindow.USER32(004A83D8,00000004), ref: 00448C43
            • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
              • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
              • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
              • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
              • Part of subcall function 004413F0: SendMessageW.USER32(0020DD58,000000F1,00000000,00000000), ref: 004414C6
              • Part of subcall function 004413F0: SendMessageW.USER32(0020DD58,000000F1,00000001,00000000), ref: 004414F1
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$EnableMessageSend$LongShow
            • String ID:
            • API String ID: 142311417-0
            • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
            • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
            • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
            • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
            APIs
            • _memset.LIBCMT ref: 0044955A
              • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
            • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
            • _wcslen.LIBCMT ref: 004495C1
            • _wcslen.LIBCMT ref: 004495CE
            • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend_wcslen$_memset_wcspbrk
            • String ID:
            • API String ID: 1843234404-0
            • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
            • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
            • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
            • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
            • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
            • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
            • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
            APIs
            • IsWindowVisible.USER32(?), ref: 00445721
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
            • _wcslen.LIBCMT ref: 004457A3
            • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
            • String ID:
            • API String ID: 3087257052-0
            • Opcode ID: 26db20d7f247ea922bda5968985a175caa13d0c4701d936ec62fbed3d9b395f5
            • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
            • Opcode Fuzzy Hash: 26db20d7f247ea922bda5968985a175caa13d0c4701d936ec62fbed3d9b395f5
            • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
            APIs
            • IsWindow.USER32(00000000), ref: 00459DEF
            • GetForegroundWindow.USER32 ref: 00459E07
            • GetDC.USER32(00000000), ref: 00459E44
            • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
            • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$ForegroundPixelRelease
            • String ID:
            • API String ID: 4156661090-0
            • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
            • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
            • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
            • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
            APIs
              • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
            • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
            • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
            • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
            • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorLast$closesocketconnectinet_addrsocket
            • String ID:
            • API String ID: 245547762-0
            • Opcode ID: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
            • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
            • Opcode Fuzzy Hash: aaa03f654d2c2080970664bbc2635e6406c59b0d093f7dcd590a1c65d79e0220
            • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
            APIs
            • DeleteObject.GDI32(00000000), ref: 00447151
            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
            • SelectObject.GDI32(?,00000000), ref: 004471A2
            • BeginPath.GDI32(?), ref: 004471B7
            • SelectObject.GDI32(?,00000000), ref: 004471DC
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Object$Select$BeginCreateDeletePath
            • String ID:
            • API String ID: 2338827641-0
            • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
            • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
            • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
            • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
            APIs
            • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
            • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
            • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CounterPerformanceQuerySleep
            • String ID:
            • API String ID: 2875609808-0
            • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
            • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
            • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
            • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
            APIs
            • SendMessageW.USER32 ref: 0046FD00
            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
            • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
            • DestroyIcon.USER32(?), ref: 0046FD58
            • DestroyIcon.USER32(?), ref: 0046FD5F
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$DestroyIcon
            • String ID:
            • API String ID: 3419509030-0
            • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
            • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
            • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
            • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
            APIs
            • __getptd.LIBCMT ref: 004175AE
              • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
              • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
            • __amsg_exit.LIBCMT ref: 004175CE
            • __lock.LIBCMT ref: 004175DE
            • InterlockedDecrement.KERNEL32(?,0048C9D8,0000000C,00411498,00000000,?,004114D4,?,00000000), ref: 004175FB
            • InterlockedIncrement.KERNEL32(000F1A00,0048C9D8,0000000C,00411498,00000000,?,004114D4,?,00000000), ref: 00417626
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
            • String ID:
            • API String ID: 4271482742-0
            • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
            • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
            • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
            • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$Icon
            • String ID:
            • API String ID: 4023252218-0
            • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
            • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
            • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
            • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 00460342
            • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
            • MessageBeep.USER32(00000000), ref: 0046036D
            • KillTimer.USER32 ref: 00460392
            • EndDialog.USER32 ref: 004603AB
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
            • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
            • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
            • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
            APIs
            • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
            • DeleteObject.GDI32(?), ref: 0045564E
            • DeleteObject.GDI32(?), ref: 0045565C
            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
            • DestroyWindow.USER32 ref: 00455678
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconMessageSendWindow
            • String ID:
            • API String ID: 1489400265-0
            • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
            • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
            • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
            • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
            APIs
              • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
            • DestroyWindow.USER32 ref: 00455640
            • DeleteObject.GDI32(?), ref: 0045564E
            • DeleteObject.GDI32(?), ref: 0045565C
            • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
            • DestroyWindow.USER32 ref: 00455678
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
            • String ID:
            • API String ID: 1042038666-0
            • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
            • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
            • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
            • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Path$ObjectStroke$DeleteFillSelect
            • String ID:
            • API String ID: 2625713937-0
            • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
            • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
            • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
            • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
            APIs
              • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
            • ___set_flsgetvalue.LIBCMT ref: 004140E1
              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
            • ___fls_getvalue@4.LIBCMT ref: 004140EC
              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
            • ___fls_setvalue@8.LIBCMT ref: 004140FF
              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
            • ExitThread.KERNEL32 ref: 0041410F
            • GetCurrentThreadId.KERNEL32(00000000,?,00000000), ref: 00414115
            • __freefls@4.LIBCMT ref: 00414135
            • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 132634196-0
            • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
            • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
            • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
            • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
            APIs
            • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
              • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
            • __getptd_noexit.LIBCMT ref: 00415620
            • CloseHandle.KERNEL32(?), ref: 00415634
            • __freeptd.LIBCMT ref: 0041563B
            • ExitThread.KERNEL32 ref: 00415643
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
            • String ID:
            • API String ID: 3798957060-0
            • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
            • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
            • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
            • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
            APIs
              • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
            • ___set_flsgetvalue.LIBCMT ref: 00415690
              • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
              • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
              • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
            • ___fls_getvalue@4.LIBCMT ref: 0041569B
              • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
            • ___fls_setvalue@8.LIBCMT ref: 004156AD
              • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
            • ExitThread.KERNEL32 ref: 004156BD
            • __freefls@4.LIBCMT ref: 004156D9
            • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 1537469427-0
            • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
            • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
            • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
            • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _malloc
            • String ID: Default$|k
            • API String ID: 1579825452-2254895183
            • Opcode ID: 93aa395ff754088fbc9e0579b51342dee62b3b606854a7c6c0245429862da8b0
            • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
            • Opcode Fuzzy Hash: 93aa395ff754088fbc9e0579b51342dee62b3b606854a7c6c0245429862da8b0
            • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
            APIs
              • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
            • CoInitialize.OLE32(00000000), ref: 0046CE18
            • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
            • CoUninitialize.OLE32 ref: 0046CE50
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
            • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
            • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
            • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcslen
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 176396367-557222456
            • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
            • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
            • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
            • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
            APIs
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
            • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
            • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Variant$ClearCopyInit_malloc
            • String ID: 4RH
            • API String ID: 2981388473-749298218
            • Opcode ID: 8597c41bd6bd9e5c70c8eccbc8cf2b8b8044ff49b8f1509b14a04f4898846acd
            • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
            • Opcode Fuzzy Hash: 8597c41bd6bd9e5c70c8eccbc8cf2b8b8044ff49b8f1509b14a04f4898846acd
            • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
            APIs
              • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
              • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
            • __wcsnicmp.LIBCMT ref: 0046681A
            • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Connection__wcsnicmp_wcscpy_wcslen
            • String ID: LPT$HH
            • API String ID: 3035604524-2728063697
            • Opcode ID: 4168d29b7d0848dc605f9ce781fdb6688c60699af114ee795911c582be7b9077
            • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
            • Opcode Fuzzy Hash: 4168d29b7d0848dc605f9ce781fdb6688c60699af114ee795911c582be7b9077
            • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
            APIs
              • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32 ref: 004374E2
            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
              • Part of subcall function 00437472: ReadProcessMemory.KERNEL32 ref: 004374A5
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
            • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$MemoryProcess$ReadWrite
            • String ID: @
            • API String ID: 4055202900-2766056989
            • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
            • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
            • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
            • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CrackInternet_memset_wcslen
            • String ID: |
            • API String ID: 915713708-2343686810
            • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
            • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
            • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
            • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
            • HttpQueryInfoW.WININET ref: 0044A892
              • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
            • String ID:
            • API String ID: 3705125965-3916222277
            • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
            • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
            • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
            • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
            • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
            • SetWindowLongW.USER32(00000000,000000F0,00000000,?,000000F0), ref: 00450AB3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
            • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
            • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
            • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
            APIs
            • LoadLibraryA.KERNEL32(?), ref: 00437CB2
            • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
            • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Library$AddressFreeLoadProc
            • String ID: AU3_GetPluginDetails
            • API String ID: 145871493-4132174516
            • Opcode ID: 06d0308278136abd8afe0949b03919407905039ce5a8e3307e807f7905fa9d8e
            • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
            • Opcode Fuzzy Hash: 06d0308278136abd8afe0949b03919407905039ce5a8e3307e807f7905fa9d8e
            • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: msctls_updown32
            • API String ID: 3375834691-2298589950
            • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
            • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
            • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
            • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
            APIs
            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
            • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
            • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 0045125D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$MoveWindow
            • String ID: Listbox
            • API String ID: 3315199576-2633736733
            • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
            • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
            • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
            • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D243
            • GetVolumeInformationW.KERNEL32 ref: 0045D2C7
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: HH
            • API String ID: 2507767853-2761332787
            • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
            • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
            • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
            • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
            • GetVolumeInformationW.KERNEL32 ref: 0045D4CE
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: HH
            • API String ID: 2507767853-2761332787
            • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
            • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
            • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
            • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
            APIs
            • GetWindowTextLengthW.USER32(00000000,?,?,edit,?,00000000,?,?,?,?,?,00000001,?), ref: 004515DA
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
            Strings
            • erShell\v1.0\;C:\Windows\System32\WindowsPowerShell\v1.0\, xrefs: 004515C8
            • edit, xrefs: 00451651
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit$erShell\v1.0\;C:\Windows\System32\WindowsPowerShell\v1.0\
            • API String ID: 2978978980-2105638248
            • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
            • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
            • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
            • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
            • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
            • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
            • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
            • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
            APIs
              • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
            • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
            • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
            • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
            • String ID: HH
            • API String ID: 1515696956-2761332787
            • Opcode ID: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
            • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
            • Opcode Fuzzy Hash: 9fa1cc3982deb19834a74a1ffc0ee15940528313d09b960f7f62ca7fb5990435
            • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
            APIs
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            • GetMenuItemInfoW.USER32 ref: 004497EA
            • SetMenuItemInfoW.USER32 ref: 00449817
            • DrawMenuBar.USER32(?,?,00000000,?), ref: 00449828
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Menu$InfoItem$Draw_malloc
            • String ID: 0
            • API String ID: 772068139-4108050209
            • Opcode ID: f9e456d65f37a3d64cb432bc1a1f977de8c9fc5d92ba122409fca0b229618a80
            • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
            • Opcode Fuzzy Hash: f9e456d65f37a3d64cb432bc1a1f977de8c9fc5d92ba122409fca0b229618a80
            • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AllocTask_wcslen
            • String ID: hkG
            • API String ID: 2651040394-3610518997
            • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
            • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
            • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
            • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetSystemWow64DirectoryW$kernel32.dll
            • API String ID: 2574300362-1816364905
            • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
            • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
            • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
            • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004343DE
            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpSendEcho
            • API String ID: 2574300362-58917771
            • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
            • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
            • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
            • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 0043440D
            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCloseHandle
            • API String ID: 2574300362-3530519716
            • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
            • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
            • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
            • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 0043443C
            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCreateFile
            • API String ID: 2574300362-275556492
            • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
            • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
            • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
            • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040EE7B
            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: IsWow64Process$kernel32.dll
            • API String ID: 2574300362-3024904723
            • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
            • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
            • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
            • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0040EEEB
            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0040EEFD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 2574300362-192647395
            • Opcode ID: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
            • Instruction ID: 788ba9bdae5bc0ddad915f4d08bdcf590d5e3b2ea1e3da194f5c7121584c3133
            • Opcode Fuzzy Hash: 58ac1dddc1eea1967b9e3df612208a50857473a21dbb81c427901d39c1ebcba1
            • Instruction Fuzzy Hash: ABD0C9B0944703AAC7311F72C91C70A7AE4AB40341F204C3EB996E1691DBBCC0508B2C
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 05dd77c4c4e1e7f773cce1883d0b5346e5ce6ea378ee5ed9da1d6d56ea86f387
            • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
            • Opcode Fuzzy Hash: 05dd77c4c4e1e7f773cce1883d0b5346e5ce6ea378ee5ed9da1d6d56ea86f387
            • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
            APIs
            • __flush.LIBCMT ref: 00414630
            • __fileno.LIBCMT ref: 00414650
            • __locking.LIBCMT ref: 00414657
            • __flsbuf.LIBCMT ref: 00414682
              • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
              • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
            • String ID:
            • API String ID: 3240763771-0
            • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
            • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
            • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
            • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
            APIs
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
            • VariantCopy.OLEAUT32(?,?), ref: 00478259
            • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
            • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CopyVariant$ErrorLast
            • String ID:
            • API String ID: 2286883814-0
            • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
            • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
            • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
            • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
            APIs
            • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
            • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
            • #21.WSOCK32 ref: 004740E0
            • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorLast$socket
            • String ID:
            • API String ID: 1881357543-0
            • Opcode ID: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
            • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
            • Opcode Fuzzy Hash: 49e735c62c31738b54d4bbc911449ab864d290153f15be7477df25c465b7d9f8
            • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
            APIs
            • ClientToScreen.USER32(00000000,?), ref: 00441CDE
            • GetWindowRect.USER32(?,?), ref: 00441D5A
            • PtInRect.USER32(?,?,?), ref: 00441D6F
            • MessageBeep.USER32(00000000,?,?,?,?,?,?,?), ref: 00441DF2
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
            • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
            • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
            • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
            • __isleadbyte_l.LIBCMT ref: 004238B2
            • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
            • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
            • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
            • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
            • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
            APIs
            • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D10A
            • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
            • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
            • CreateHardLinkW.KERNEL32(00000000,?,00000000), ref: 0045D16A
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
            • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
            • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
            • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
            APIs
            • GetParent.USER32(?), ref: 004505BF
            • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
            • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
            • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Proc$Parent
            • String ID:
            • API String ID: 2351499541-0
            • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
            • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
            • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
            • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
            APIs
              • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
              • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
            • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
            • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
            • __itow.LIBCMT ref: 00461461
            • __itow.LIBCMT ref: 004614AB
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$__itow$_wcslen
            • String ID:
            • API String ID: 2875217250-0
            • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
            • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
            • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
            • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
            APIs
            • _memset.LIBCMT ref: 0040E202
            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: IconNotifyShell__memset
            • String ID:
            • API String ID: 928536360-0
            • Opcode ID: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
            • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
            • Opcode Fuzzy Hash: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
            • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
            APIs
            • GetForegroundWindow.USER32 ref: 00472806
              • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
              • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32(00000000), ref: 00443F18
              • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
            • GetCaretPos.USER32(?), ref: 0047281A
            • ClientToScreen.USER32(00000000,?), ref: 00472856
            • GetForegroundWindow.USER32 ref: 0047285C
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
            • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
            • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
            • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
            APIs
              • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
            • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
            • SetWindowLongW.USER32(?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772A9
            • SetWindowLongW.USER32(?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772C0
            • SetLayeredWindowAttributes.USER32 ref: 004772D0
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$Long$AttributesLayered
            • String ID:
            • API String ID: 2169480361-0
            • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
            • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
            • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
            • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
            APIs
            • SendMessageW.USER32 ref: 00448CB8
            • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
            • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
            • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
            • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
            • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
            APIs
            • select.WSOCK32 ref: 0045890A
            • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
            • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
            • WSAGetLastError.WSOCK32(00000000), ref: 00458952
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ErrorLastacceptselect
            • String ID:
            • API String ID: 385091864-0
            • Opcode ID: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
            • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
            • Opcode Fuzzy Hash: abc1db9f2e63247cad6e2e0496bedee0f0acb9a353b4738024f17ecaf3b799d2
            • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
            • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
            • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
            • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
            APIs
            • CreateWindowExW.USER32 ref: 0043367E
            • GetStockObject.GDI32(00000011), ref: 00433695
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
            • ShowWindow.USER32(00000000,00000000), ref: 004336BA
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Window$CreateMessageObjectSendShowStock
            • String ID:
            • API String ID: 1358664141-0
            • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
            • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
            • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
            • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 004441B8
            • MessageBoxW.USER32 ref: 004441F6
            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
            • CloseHandle.KERNEL32(00000000), ref: 00444213
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
            • String ID:
            • API String ID: 2880819207-0
            • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
            • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
            • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
            • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
            APIs
            • GetWindowRect.USER32(?,?), ref: 00434037
            • ScreenToClient.USER32(?,?), ref: 0043405B
            • ScreenToClient.USER32(?,?), ref: 00434085
            • InvalidateRect.USER32(?,?,?), ref: 004340A4
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ClientRectScreen$InvalidateWindow
            • String ID:
            • API String ID: 357397906-0
            • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
            • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
            • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
            • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
            • String ID:
            • API String ID: 3016257755-0
            • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
            • Instruction ID: 11ead64bc5c18606fe5fffcedc2bbdf89ccfa4faa7bd693ca83be0ddd2add3a5
            • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
            • Instruction Fuzzy Hash: AA11A272500059BBCF225E85EC018EE3F66FB88354B898416FE2858131C73AC9B1AB85
            APIs
            • __wsplitpath.LIBCMT ref: 00436A45
              • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
            • __wsplitpath.LIBCMT ref: 00436A6C
            • __wcsicoll.LIBCMT ref: 00436A93
            • __wcsicoll.LIBCMT ref: 00436AB0
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
            • String ID:
            • API String ID: 1187119602-0
            • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
            • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
            • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
            • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _wcslen$_malloc_wcscat_wcscpy
            • String ID:
            • API String ID: 1597257046-0
            • Opcode ID: 9080831c6e3327375fa8e2590c4296ec00bc2fee719a816d2a7a1c5fc2e8ee26
            • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
            • Opcode Fuzzy Hash: 9080831c6e3327375fa8e2590c4296ec00bc2fee719a816d2a7a1c5fc2e8ee26
            • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconWindow
            • String ID:
            • API String ID: 3349847261-0
            • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
            • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
            • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
            • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
            APIs
            • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
            • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterExchangeInterlocked
            • String ID:
            • API String ID: 2223660684-0
            • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
            • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
            • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
            • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
            APIs
              • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
              • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00447195
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
              • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
              • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
            • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
            • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
            • EndPath.GDI32(?), ref: 004472B0
            • StrokePath.GDI32(?), ref: 004472BE
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
            • String ID:
            • API String ID: 2783949968-0
            • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
            • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
            • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
            • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
            APIs
            • __getptd.LIBCMT ref: 00417D1A
              • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
              • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
            • __getptd.LIBCMT ref: 00417D31
            • __amsg_exit.LIBCMT ref: 00417D3F
            • __lock.LIBCMT ref: 00417D4F
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: __amsg_exit__getptd$__getptd_noexit__lock
            • String ID:
            • API String ID: 3521780317-0
            • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
            • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
            • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
            • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
            APIs
            • GetDesktopWindow.USER32 ref: 00471144
            • GetDC.USER32(00000000), ref: 0047114D
            • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
            • ReleaseDC.USER32(00000000,?), ref: 0047117B
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
            • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
            • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
            • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
            APIs
            • GetDesktopWindow.USER32 ref: 00471102
            • GetDC.USER32(00000000), ref: 0047110B
            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
            • ReleaseDC.USER32(00000000,?), ref: 00471139
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
            • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
            • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
            • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
            APIs
            • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
            • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
            • GetCurrentThreadId.KERNEL32(00000000), ref: 004389DA
            • AttachThreadInput.USER32(00000000), ref: 004389E1
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
            • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
            • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
            • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
            • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
            • CloseHandle.KERNEL32(?), ref: 004390EB
            • CloseHandle.KERNEL32 ref: 004390F0
              • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
              • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000), ref: 00438FC8
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
            • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
            • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
            • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
            APIs
            • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
              • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
            • __getptd_noexit.LIBCMT ref: 00414080
            • __freeptd.LIBCMT ref: 0041408A
            • ExitThread.KERNEL32 ref: 00414093
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
            • String ID:
            • API String ID: 3182216644-0
            • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
            • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
            • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
            • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: BuffCharLower
            • String ID: $8'I
            • API String ID: 2358735015-3608026889
            • Opcode ID: 6283da0382942cdf179c2defd90104cfb3bb41bca83c8823c3d3809723584f1e
            • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
            • Opcode Fuzzy Hash: 6283da0382942cdf179c2defd90104cfb3bb41bca83c8823c3d3809723584f1e
            • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
            APIs
            • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
              • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
              • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
              • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
            • String ID: AutoIt3GUI$Container
            • API String ID: 3380330463-3941886329
            • Opcode ID: 031cbee35206a8445208c2b512d30020b761577131fe68926333f9eb27ef2b8d
            • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
            • Opcode Fuzzy Hash: 031cbee35206a8445208c2b512d30020b761577131fe68926333f9eb27ef2b8d
            • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
            APIs
            • _wcslen.LIBCMT ref: 00409A61
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
              • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
              • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
              • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
            • CharUpperBuffW.USER32(?,?), ref: 00409AF5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
            • String ID: 0vH
            • API String ID: 1143807570-3662162768
            • Opcode ID: 91b6cb900ed417c533260d5c256813c8ee98ba88ee474f01c423a17eae430ae8
            • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
            • Opcode Fuzzy Hash: 91b6cb900ed417c533260d5c256813c8ee98ba88ee474f01c423a17eae430ae8
            • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: HH$HH
            • API String ID: 0-1787419579
            • Opcode ID: fed4e066af51e45fc8c5976399addcc25001bc25a5639efd16b547c1275b717f
            • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
            • Opcode Fuzzy Hash: fed4e066af51e45fc8c5976399addcc25001bc25a5639efd16b547c1275b717f
            • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: 99cbe353e2901de66005753853838c613826515f51032c8bbd27fd43aed3c9d1
            • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
            • Opcode Fuzzy Hash: 99cbe353e2901de66005753853838c613826515f51032c8bbd27fd43aed3c9d1
            • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
            APIs
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: '
            • API String ID: 3850602802-1997036262
            • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
            • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
            • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
            • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID:
            • String ID: 0
            • API String ID: 0-4108050209
            • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
            • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
            • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
            • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
            • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
            • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
            • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
            • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
            APIs
            • Sleep.KERNEL32(00000000), ref: 00474833
            • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
            • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
            • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
            • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: htonsinet_addr
            • String ID: 255.255.255.255
            • API String ID: 3832099526-2422070025
            • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
            • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
            • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
            • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 455545452-1403004172
            • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
            • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
            • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
            • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: InternetOpen
            • String ID: <local>
            • API String ID: 2038078732-4266983199
            • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
            • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
            • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
            • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 455545452-1403004172
            • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
            • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
            • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
            • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
            APIs
              • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
            • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 455545452-1403004172
            • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
            • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
            • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
            • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _strncmp
            • String ID: ,$UTF8)
            • API String ID: 909875538-2632631837
            • Opcode ID: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
            • Instruction ID: 35c0b5e4e6bd282640ba12729024cfd3588da47ca1ed1c49f01331a057b7ec9b
            • Opcode Fuzzy Hash: 727c7c5760fb27673dbb24875b26f121239a8201232c39922ad2fa80f7f85d54
            • Instruction Fuzzy Hash: 7601B575A083805BE720DE20CC85BA773A1AB81319F58492ED8D5872A1F73DD449C75B
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: _strncmp
            • String ID: ,$UTF8)
            • API String ID: 909875538-2632631837
            • Opcode ID: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
            • Instruction ID: b3c6803870d1b21283bf32431af321d4190ac902c568a1d8b2e557ddf245ca97
            • Opcode Fuzzy Hash: abd9c85c193eb76a615b38e8260140970f327620044c052ec7ea970ca86f7e2a
            • Instruction Fuzzy Hash: 1E01D875A043805BE720DE20CC85B6773A19B4131AF68492FD8D6872A1F73DD449C75B
            APIs
            • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
              • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
            • wsprintfW.USER32 ref: 004560E9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: MessageSend_mallocwsprintf
            • String ID: %d/%02d/%02d
            • API String ID: 1262938277-328681919
            • Opcode ID: a0b39a4cd3c0c8a7adb8db444dc879b20475413a32e353ad3a6ec36c60b55e02
            • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
            • Opcode Fuzzy Hash: a0b39a4cd3c0c8a7adb8db444dc879b20475413a32e353ad3a6ec36c60b55e02
            • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
            APIs
            • FindWindowW.USER32 ref: 0044226C
            • PostMessageW.USER32 ref: 0044227F
              • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
            • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
            • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
            • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
            APIs
            • FindWindowW.USER32 ref: 00442240
            • PostMessageW.USER32 ref: 00442247
              • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
            • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
            • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
            • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
            APIs
            • MessageBoxW.USER32 ref: 00439522
              • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.357824326.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.357819931.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357836058.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357840600.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.357850119.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Proforma Invoice_pdf.jbxd
            Similarity
            • API ID: Message_doexit
            • String ID: AutoIt$Error allocating memory.
            • API String ID: 1993061046-4017498283
            • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
            • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
            • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
            • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E