Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fedex Express Invoice 09004106.exe

Overview

General Information

Sample name:Fedex Express Invoice 09004106.exe
Analysis ID:1517900
MD5:8199ffafedc8a2c3b530f0dec6bfb161
SHA1:befe646b46076237539c6f0389c571b758ee0ee8
SHA256:5d2055e42e7ec595a3f60ee9fb7ded3d435001ce6b2a3585247b84a029255e13
Tags:exeFedExuser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected RedLine Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables security privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Fedex Express Invoice 09004106.exe (PID: 2840 cmdline: "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe" MD5: 8199FFAFEDC8A2C3B530F0DEC6BFB161)
    • name.exe (PID: 6908 cmdline: "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe" MD5: 8199FFAFEDC8A2C3B530F0DEC6BFB161)
      • RegSvcs.exe (PID: 592 cmdline: "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • conhost.exe (PID: 6592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 2228 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • name.exe (PID: 2624 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 8199FFAFEDC8A2C3B530F0DEC6BFB161)
      • RegSvcs.exe (PID: 3004 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • conhost.exe (PID: 3128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["204.10.160.224:27667"], "Bot Id": "button1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: RegSvcs.exe PID: 592JoeSecurity_RedLineYara detected RedLine StealerJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 2228, ProcessName: wscript.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 2228, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 6908, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Fedex Express Invoice 09004106.exeAvira: detected
    Source: C:\Users\user\AppData\Local\directory\name.exeAvira: detection malicious, Label: HEUR/AGEN.1321671
    Source: 2.2.name.exe.44f0000.1.raw.unpackMalware Configuration Extractor: RedLine {"C2 url": ["204.10.160.224:27667"], "Bot Id": "button1"}
    Source: C:\Users\user\AppData\Local\directory\name.exeReversingLabs: Detection: 47%
    Source: Fedex Express Invoice 09004106.exeReversingLabs: Detection: 47%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
    Source: Fedex Express Invoice 09004106.exeJoe Sandbox ML: detected
    Source: Fedex Express Invoice 09004106.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1585915300.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1585781577.0000000004580000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1787843612.00000000045B0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1788467832.0000000004750000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1585915300.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1585781577.0000000004580000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1787843612.00000000045B0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1788467832.0000000004750000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,8_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,8_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,8_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,8_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045DE8F FindFirstFileW,FindClose,8_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0044BF8B
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior

    Networking

    barindex
    Source: Malware configuration extractorURLs: 204.10.160.224:27667
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
    Source: RegSvcs.exe, 00000004.00000002.1608034933.00000000032CB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000004.00000002.1608034933.00000000032CB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000004.00000002.1608034933.00000000032CB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000004.00000002.1608034933.00000000032CB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000009.00000002.1796118820.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.
    Source: RegSvcs.exe, 00000004.00000002.1608034933.000000000328A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002CDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
    Source: RegSvcs.exe, 00000009.00000002.1796118820.0000000002CDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
    Source: RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,8_2_0045A10F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
    Source: RegSvcs.exe, 00000004.00000002.1608034933.0000000003417000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_dbd6fbfa-8
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,8_2_0047C81C

    System Summary

    barindex
    Source: 2.2.name.exe.44f0000.1.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: 8.2.name.exe.4490000.1.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: initial sampleStatic PE information: Filename: Fedex Express Invoice 09004106.exe
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,8_2_004333BE
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004096A00_2_004096A0
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0042200C0_2_0042200C
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0041A2170_2_0041A217
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004122160_2_00412216
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0042435D0_2_0042435D
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004033C00_2_004033C0
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044F4300_2_0044F430
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004125E80_2_004125E8
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044663B0_2_0044663B
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004138010_2_00413801
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0042096F0_2_0042096F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004129D00_2_004129D0
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004119E30_2_004119E3
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0041C9AE0_2_0041C9AE
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0047EA6F0_2_0047EA6F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0040FA100_2_0040FA10
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044EB5F0_2_0044EB5F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00423C810_2_00423C81
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00411E780_2_00411E78
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00442E0C0_2_00442E0C
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00420EC00_2_00420EC0
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044CF170_2_0044CF17
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00444FD20_2_00444FD2
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_043836700_2_04383670
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_04386E780_2_04386E78
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_042406702_2_04240670
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_04243E782_2_04243E78
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0169A4374_2_0169A437
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004096A08_2_004096A0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0042200C8_2_0042200C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041A2178_2_0041A217
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004122168_2_00412216
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0042435D8_2_0042435D
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004033C08_2_004033C0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044F4308_2_0044F430
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004125E88_2_004125E8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044663B8_2_0044663B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004138018_2_00413801
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0042096F8_2_0042096F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004129D08_2_004129D0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004119E38_2_004119E3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041C9AE8_2_0041C9AE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0047EA6F8_2_0047EA6F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0040FA108_2_0040FA10
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044EB5F8_2_0044EB5F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00423C818_2_00423C81
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00411E788_2_00411E78
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00442E0C8_2_00442E0C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00420EC08_2_00420EC0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044CF178_2_0044CF17
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00444FD28_2_00444FD2
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_041E52788_2_041E5278
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_041E8A808_2_041E8A80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02A8A4539_2_02A8A453
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess token adjusted: SecurityJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 004115D7 appears 36 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00416C70 appears 39 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00445AE0 appears 65 times
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: String function: 004115D7 appears 36 times
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: String function: 00416C70 appears 39 times
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: String function: 00445AE0 appears 65 times
    Source: Fedex Express Invoice 09004106.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: 2.2.name.exe.44f0000.1.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: 2.2.name.exe.44f0000.1.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: 8.2.name.exe.4490000.1.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: 8.2.name.exe.4490000.1.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@12/4@0/0
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,8_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,8_2_00464EAE
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeFile created: C:\Users\user\AppData\Local\directoryJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6592:120:WilError_03
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3128:120:WilError_03
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeFile created: C:\Users\user\AppData\Local\Temp\electicismJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Source: Fedex Express Invoice 09004106.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Fedex Express Invoice 09004106.exeReversingLabs: Detection: 47%
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeFile read: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: Fedex Express Invoice 09004106.exeStatic file information: File size 1503943 > 1048576
    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1585915300.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1585781577.0000000004580000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1787843612.00000000045B0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1788467832.0000000004750000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1585915300.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1585781577.0000000004580000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1787843612.00000000045B0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1788467832.0000000004750000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
    Source: Fedex Express Invoice 09004106.exeStatic PE information: real checksum: 0xa961f should be: 0x17e041
    Source: name.exe.0.drStatic PE information: real checksum: 0xa961f should be: 0x17e041
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00416CB5 push ecx; ret 8_2_00416CC8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02A84890 push esp; retn 0002h9_2_02A84892
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_02A8B400 pushfd ; retn 0002h9_2_02A8B402
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,8_2_0047A330
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,8_2_00434418
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 4243A9C
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 41E86A4
    Source: RegSvcs.exe, 00000004.00000002.1608034933.000000000331E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,
    Source: RegSvcs.exe, 00000004.00000002.1608034933.000000000331E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
    Source: RegSvcs.exe, 00000004.00000002.1608034933.000000000331E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87737
    Source: C:\Users\user\AppData\Local\directory\name.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeAPI coverage: 3.8 %
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 3.9 %
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,8_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,8_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,8_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,8_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045DE8F FindFirstFileW,FindClose,8_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0044BF8B
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
    Source: wscript.exe, 00000007.00000002.1677317247.0000022F9F095000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}%
    Source: RegSvcs.exe, 00000004.00000002.1608034933.000000000331E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
    Source: RegSvcs.exe, 00000004.00000002.1608034933.000000000331E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,
    Source: wscript.exe, 00000007.00000002.1677317247.0000022F9F095000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
    Source: RegSvcs.exe, 00000004.00000002.1608034933.000000000331E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeAPI call chain: ExitProcess graph end nodegraph_0-86867
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_04383500 mov eax, dword ptr fs:[00000030h]0_2_04383500
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_04383560 mov eax, dword ptr fs:[00000030h]0_2_04383560
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_043856C8 mov eax, dword ptr fs:[00000030h]0_2_043856C8
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_04386D08 mov eax, dword ptr fs:[00000030h]0_2_04386D08
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_04386D68 mov eax, dword ptr fs:[00000030h]0_2_04386D68
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_04240500 mov eax, dword ptr fs:[00000030h]2_2_04240500
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_04243D08 mov eax, dword ptr fs:[00000030h]2_2_04243D08
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_04240560 mov eax, dword ptr fs:[00000030h]2_2_04240560
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_04243D68 mov eax, dword ptr fs:[00000030h]2_2_04243D68
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_042426C8 mov eax, dword ptr fs:[00000030h]2_2_042426C8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_041E5108 mov eax, dword ptr fs:[00000030h]8_2_041E5108
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_041E5168 mov eax, dword ptr fs:[00000030h]8_2_041E5168
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_041E72D0 mov eax, dword ptr fs:[00000030h]8_2_041E72D0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_041E8910 mov eax, dword ptr fs:[00000030h]8_2_041E8910
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_041E8970 mov eax, dword ptr fs:[00000030h]8_2_041E8970
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041F250 SetUnhandledExceptionFilter,8_2_0041F250
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0041A208
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00417DAA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1009008Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: AD2008Jump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
    Source: Fedex Express Invoice 09004106.exe, name.exeBinary or memory string: Shell_TrayWnd
    Source: RegSvcs.exe, 00000004.00000002.1608034933.0000000003417000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: Fedex Express Invoice 09004106.exe, name.exe.0.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
    Source: RegSvcs.exe, 00000004.00000002.1608034933.0000000003417000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002E73000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 592, type: MEMORYSTR
    Source: name.exeBinary or memory string: WIN_XP
    Source: name.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
    Source: name.exeBinary or memory string: WIN_XPe
    Source: name.exeBinary or memory string: WIN_VISTA
    Source: name.exeBinary or memory string: WIN_7
    Source: name.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 592, type: MEMORYSTR
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
    Source: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,8_2_004652BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,8_2_00476619
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,8_2_0046CEF3
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information111
    Scripting
    2
    Valid Accounts
    2
    Native API
    111
    Scripting
    1
    Exploitation for Privilege Escalation
    11
    Disable or Modify Tools
    31
    Input Capture
    2
    System Time Discovery
    Remote Services11
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    DLL Side-Loading
    11
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol31
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt2
    Valid Accounts
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCron2
    Registry Run Keys / Startup Folder
    21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS116
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
    Process Injection
    1
    Masquerading
    LSA Secrets321
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    Cached Domain Credentials11
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
    Virtualization/Sandbox Evasion
    DCSync2
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
    Access Token Manipulation
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
    Process Injection
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1517900 Sample: Fedex Express Invoice 09004... Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Antivirus / Scanner detection for submitted sample 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 8 other signatures 2->39 8 Fedex Express Invoice 09004106.exe 3 2->8         started        11 wscript.exe 1 2->11         started        process3 file4 29 C:\Users\user\AppData\Local\...\name.exe, PE32 8->29 dropped 14 name.exe 1 8->14         started        43 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->43 18 name.exe 11->18         started        signatures5 process6 file7 31 C:\Users\user\AppData\Roaming\...\name.vbs, data 14->31 dropped 45 Antivirus detection for dropped file 14->45 47 Multi AV Scanner detection for dropped file 14->47 49 Machine Learning detection for dropped file 14->49 55 2 other signatures 14->55 20 RegSvcs.exe 4 14->20         started        51 Writes to foreign memory regions 18->51 53 Maps a DLL or memory area into another process 18->53 23 RegSvcs.exe 3 18->23         started        signatures8 process9 signatures10 41 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->41 25 conhost.exe 20->25         started        27 conhost.exe 23->27         started        process11

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Fedex Express Invoice 09004106.exe47%ReversingLabsWin32.Trojan.ShellcodeCrypter
    Fedex Express Invoice 09004106.exe100%AviraHEUR/AGEN.1321671
    Fedex Express Invoice 09004106.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\directory\name.exe100%AviraHEUR/AGEN.1321671
    C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\directory\name.exe47%ReversingLabsWin32.Trojan.ShellcodeCrypter
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://api.ip.sb/ip0%URL Reputationsafe
    204.10.160.224:276670%Avira URL Cloudsafe
    http://www.w3.0%Avira URL Cloudsafe
    https://api.ip.s0%Avira URL Cloudsafe
    https://discord.com/api/v9/users/0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    204.10.160.224:27667true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.w3.RegSvcs.exe, 00000009.00000002.1796118820.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://api.ip.sb/ipRegSvcs.exe, 00000009.00000002.1796118820.0000000002CDA000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://api.ip.sRegSvcs.exe, 00000004.00000002.1608034933.000000000328A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1796118820.0000000002CDA000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://discord.com/api/v9/users/RegSvcs.exe, 00000009.00000002.1796118820.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1517900
    Start date and time:2024-09-25 08:54:32 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 8m 12s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:14
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Fedex Express Invoice 09004106.exe
    Detection:MAL
    Classification:mal100.troj.expl.evad.winEXE@12/4@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 59
    • Number of non-executed functions: 303
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: Fedex Express Invoice 09004106.exe
    TimeTypeDescription
    07:55:49AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):1119
    Entropy (8bit):5.345080863654519
    Encrypted:false
    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
    MD5:88593431AEF401417595E7A00FE86E5F
    SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
    SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
    SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
    Process:C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
    File Type:data
    Category:dropped
    Size (bytes):550912
    Entropy (8bit):6.80275599097665
    Encrypted:false
    SSDEEP:12288:LdMZa9a909yejZZCjzxi4Ce0aY8DUme7gnxxi3Y5tz:5MZa090EugxiTr8Nxxi3Yz
    MD5:0701C642E8B3E4EB599FC183A43CE75A
    SHA1:4727EC4FD0FB7BEB434EECF5E50C5A5944EE1556
    SHA-256:584BA0F288208E96192FC8DB0EA91D46E90E64CF3945A2BB2CF66D959FFCD44A
    SHA-512:C3682DEFEDBC53F91FB237B78766CC193AFCDA0C4454C1AB3764DE2AEE49DF56E7D57A67E0BE459D94E73DF8E5AE9D652BA41D8911CBDA0F217F3CC9D47A332E
    Malicious:false
    Reputation:low
    Preview:~..5@5JI]F9X..3A.5C5JIYFyXS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5.5JIWY.VS.:.y.By.h..P+sDA.?G"Xj*8(W7'.Q$xG6[j 7f}...^.<Pm8GC}F9XS43A.pC5.HZFx.=.3AX5C5JI.F7YX5.AX.A5J.\F9XS4..Z5C.JIY.;XS4sAX.C5JKYF=XS43AX5G5JIYF9XS.;AX7C5JIYF:X..3AH5C%JIYF)XS$3AX5C5ZIYF9XS43AX57.HI.F9XS.1A:.F5JIYF9XS43AX5C5JIY.1X_43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYf9X[43AX5C5JIYF1xS4{AX5C5JIYF9X}@V9,5C5..[F9xS43.Z5C7JIYF9XS43AX5C5jIY&.* FPAX5!.OIY.;XS.6AX.A5JIYF9XS43AX5.5J.w4\4<W3AT5C5J.QF9ZS43'P5C5JIYF9XS43A.5CwJIYF9XS43AX5C5JI.;XS43A.5C5HI\F..R4.hY5J5JI.E9^_.2A.+C5.iYF.XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5JIYF9XS43AX5C5..'.9c.4.......h..._..z..{.T,.....?.]O3..V..Bz...z.S...=_M.....d.P.7N..Btj.{.^.....Y.....B.~s..i/+...B..Zyf.............!.....p../Td.;.p.....-Q...J.......3.k.B.. '3..k.....u.7..../....w..)@.0!.af8..0...z......s.U....H..A%#i..br8..J.+=1..8...._.Bb.q0.Dv.A..Y.."... ....7.G
    Process:C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):1503943
    Entropy (8bit):7.6072155519779
    Encrypted:false
    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCc9Koefk81MLiR28VLLw0l+tqiiQQd6bjFCyaVW2:7JZoQrbTFZY1iaCcAk81MLiR28VL9l+K
    MD5:8199FFAFEDC8A2C3B530F0DEC6BFB161
    SHA1:BEFE646B46076237539C6F0389C571B758EE0EE8
    SHA-256:5D2055E42E7EC595A3F60EE9FB7DED3D435001CE6B2A3585247B84A029255E13
    SHA-512:EFA04234D412A90234EE1DA584DDEBFB6416DEB54F14965D84A36E378886EABD9BD9310CAC803D68FDB22E1B6637AB946320A17C7109EFADE5447824D9D0B6B8
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    • Antivirus: Joe Sandbox ML, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 47%
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@..........................P................@.......@.........................T.......(............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc...(............T..............@..@........................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\directory\name.exe
    File Type:data
    Category:dropped
    Size (bytes):266
    Entropy (8bit):3.417598043482351
    Encrypted:false
    SSDEEP:6:DMM8lfm3OOQdUfclgMsUEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNlgMsQ1A1z4mA2n
    MD5:101BA0B4EF2B92F815E5087BD9B5B42E
    SHA1:E064699D7A775A592F82434C1AD13A1CEB73ED42
    SHA-256:D229E129C06D8D6B113C3E41C27FBC445976AF919AD7CA470BEF16D0D303783D
    SHA-512:ED38ED876CD047B6BCDD98A3948890C6867A0C37361FE451C0A6C2DD38C7AE75EA55DDC9B360B08831382E7B3CC42E2745DA7081A08AAA0300AD297D30514D5E
    Malicious:true
    Reputation:moderate, very likely benign file
    Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.t.i.n.a.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.6072155519779
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Fedex Express Invoice 09004106.exe
    File size:1'503'943 bytes
    MD5:8199ffafedc8a2c3b530f0dec6bfb161
    SHA1:befe646b46076237539c6f0389c571b758ee0ee8
    SHA256:5d2055e42e7ec595a3f60ee9fb7ded3d435001ce6b2a3585247b84a029255e13
    SHA512:efa04234d412a90234ee1da584ddebfb6416deb54f14965d84a36e378886eabd9bd9310cac803d68fdb22e1b6637ab946320a17c7109efade5447824d9d0b6b8
    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCc9Koefk81MLiR28VLLw0l+tqiiQQd6bjFCyaVW2:7JZoQrbTFZY1iaCcAk81MLiR28VL9l+K
    TLSH:9965F222B5C69036C2F327B19E7FF3699A3D69360336D19733C82E711EA05416B29763
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
    Icon Hash:1733312925935517
    Entrypoint:0x4165c1
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    DLL Characteristics:TERMINAL_SERVER_AWARE
    Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
    Instruction
    call 00007F456080F0ABh
    jmp 00007F4560805F1Eh
    int3
    int3
    int3
    int3
    int3
    push ebp
    mov ebp, esp
    push edi
    push esi
    mov esi, dword ptr [ebp+0Ch]
    mov ecx, dword ptr [ebp+10h]
    mov edi, dword ptr [ebp+08h]
    mov eax, ecx
    mov edx, ecx
    add eax, esi
    cmp edi, esi
    jbe 00007F456080609Ah
    cmp edi, eax
    jc 00007F4560806236h
    cmp ecx, 00000080h
    jc 00007F45608060AEh
    cmp dword ptr [004A9724h], 00000000h
    je 00007F45608060A5h
    push edi
    push esi
    and edi, 0Fh
    and esi, 0Fh
    cmp edi, esi
    pop esi
    pop edi
    jne 00007F4560806097h
    jmp 00007F4560806472h
    test edi, 00000003h
    jne 00007F45608060A6h
    shr ecx, 02h
    and edx, 03h
    cmp ecx, 08h
    jc 00007F45608060BBh
    rep movsd
    jmp dword ptr [00416740h+edx*4]
    mov eax, edi
    mov edx, 00000003h
    sub ecx, 04h
    jc 00007F456080609Eh
    and eax, 03h
    add ecx, eax
    jmp dword ptr [00416654h+eax*4]
    jmp dword ptr [00416750h+ecx*4]
    nop
    jmp dword ptr [004166D4h+ecx*4]
    nop
    inc cx
    add byte ptr [eax-4BFFBE9Ah], dl
    inc cx
    add byte ptr [ebx], ah
    ror dword ptr [edx-75F877FAh], 1
    inc esi
    add dword ptr [eax+468A0147h], ecx
    add al, cl
    jmp 00007F4562C7E897h
    add esi, 03h
    add edi, 03h
    cmp ecx, 08h
    jc 00007F456080605Eh
    rep movsd
    jmp dword ptr [00000000h+edx*4]
    Programming Language:
    • [ C ] VS2010 SP1 build 40219
    • [C++] VS2010 SP1 build 40219
    • [ C ] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    • [ASM] VS2010 SP1 build 40219
    • [RES] VS2010 SP1 build 40219
    • [LNK] VS2010 SP1 build 40219
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
    RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
    RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
    RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
    RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
    RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
    RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
    RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
    RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
    RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
    RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
    RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
    RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
    RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
    RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
    RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
    RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
    RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
    RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
    RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
    RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
    RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
    RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
    RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
    RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
    RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
    RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
    DLLImport
    WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
    COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
    MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
    PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
    USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
    KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
    USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
    GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
    ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
    SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
    ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
    OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
    Language of compilation systemCountry where language is spokenMap
    EnglishGreat Britain
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:55:29
    Start date:25/09/2024
    Path:C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
    Imagebase:0x400000
    File size:1'503'943 bytes
    MD5 hash:8199FFAFEDC8A2C3B530F0DEC6BFB161
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:2
    Start time:02:55:40
    Start date:25/09/2024
    Path:C:\Users\user\AppData\Local\directory\name.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
    Imagebase:0x400000
    File size:1'503'943 bytes
    MD5 hash:8199FFAFEDC8A2C3B530F0DEC6BFB161
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 100%, Avira
    • Detection: 100%, Joe Sandbox ML
    • Detection: 47%, ReversingLabs
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:02:55:48
    Start date:25/09/2024
    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe"
    Imagebase:0xe40000
    File size:45'984 bytes
    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:02:55:48
    Start date:25/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff70f010000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:02:55:57
    Start date:25/09/2024
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Imagebase:0x7ff6fb110000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:02:55:57
    Start date:25/09/2024
    Path:C:\Users\user\AppData\Local\directory\name.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
    Imagebase:0x400000
    File size:1'503'943 bytes
    MD5 hash:8199FFAFEDC8A2C3B530F0DEC6BFB161
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:9
    Start time:02:56:08
    Start date:25/09/2024
    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
    Imagebase:0x860000
    File size:45'984 bytes
    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:02:56:08
    Start date:25/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff70f010000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:3.3%
      Dynamic/Decrypted Code Coverage:0.4%
      Signature Coverage:9.6%
      Total number of Nodes:2000
      Total number of Limit Nodes:36
      execution_graph 86251 4385c08 86265 4383858 86251->86265 86253 4385cbe 86268 4385af8 86253->86268 86267 4383ee3 86265->86267 86271 4386d08 GetPEB 86265->86271 86267->86253 86269 4385b01 Sleep 86268->86269 86270 4385b0f 86269->86270 86271->86267 86272 4010e0 86275 401100 86272->86275 86274 4010f8 86276 401113 86275->86276 86277 401182 86276->86277 86279 401120 86276->86279 86280 401184 86276->86280 86281 40114c 86276->86281 86278 40112c DefWindowProcW 86277->86278 86278->86274 86279->86278 86334 401000 Shell_NotifyIconW __cftoa_l 86279->86334 86313 401250 86280->86313 86283 401151 86281->86283 86284 40119d 86281->86284 86288 401219 86283->86288 86289 40115d 86283->86289 86286 4011a3 86284->86286 86287 42afb4 86284->86287 86285 401193 86285->86274 86286->86279 86296 4011b6 KillTimer 86286->86296 86297 4011db SetTimer RegisterWindowMessageW 86286->86297 86329 40f190 10 API calls 86287->86329 86288->86279 86294 401225 86288->86294 86292 401163 86289->86292 86293 42b01d 86289->86293 86298 42afe9 86292->86298 86299 40116c 86292->86299 86293->86278 86333 4370f4 52 API calls 86293->86333 86345 468b0e 74 API calls __cftoa_l 86294->86345 86295 42b04f 86335 40e0c0 86295->86335 86328 401000 Shell_NotifyIconW __cftoa_l 86296->86328 86297->86285 86305 401204 CreatePopupMenu 86297->86305 86331 40f190 10 API calls 86298->86331 86299->86279 86300 401174 86299->86300 86330 45fd57 65 API calls __cftoa_l 86300->86330 86305->86274 86307 42afe4 86307->86285 86308 42b00e 86332 401a50 330 API calls 86308->86332 86309 4011c9 PostQuitMessage 86309->86274 86312 42afdc 86312->86278 86312->86307 86314 401262 __cftoa_l 86313->86314 86315 4012e8 86313->86315 86346 401b80 86314->86346 86315->86285 86317 40128c 86318 4012d1 KillTimer SetTimer 86317->86318 86319 4012bb 86317->86319 86320 4272ec 86317->86320 86318->86315 86321 4012c5 86319->86321 86322 42733f 86319->86322 86323 4272f4 Shell_NotifyIconW 86320->86323 86324 42731a Shell_NotifyIconW 86320->86324 86321->86318 86327 427393 Shell_NotifyIconW 86321->86327 86325 427348 Shell_NotifyIconW 86322->86325 86326 42736e Shell_NotifyIconW 86322->86326 86323->86318 86324->86318 86325->86318 86326->86318 86327->86318 86328->86309 86329->86285 86330->86312 86331->86308 86332->86277 86333->86277 86334->86295 86337 40e0e7 __cftoa_l 86335->86337 86336 40e142 86339 40e184 86336->86339 86444 4341e6 63 API calls __wcsicoll 86336->86444 86337->86336 86338 42729f DestroyIcon 86337->86338 86338->86336 86341 40e1a0 Shell_NotifyIconW 86339->86341 86342 4272db Shell_NotifyIconW 86339->86342 86343 401b80 54 API calls 86341->86343 86344 40e1ba 86343->86344 86344->86277 86345->86307 86347 401b9c 86346->86347 86367 401c7e 86346->86367 86368 4013c0 86347->86368 86350 42722b LoadStringW 86353 427246 86350->86353 86351 401bb9 86373 402160 86351->86373 86387 40e0a0 86353->86387 86354 401bcd 86356 427258 86354->86356 86357 401bda 86354->86357 86391 40d200 52 API calls 2 library calls 86356->86391 86357->86353 86358 401be4 86357->86358 86386 40d200 52 API calls 2 library calls 86358->86386 86361 427267 86362 42727b 86361->86362 86363 401bf3 _wcscpy __cftoa_l _wcsncpy 86361->86363 86392 40d200 52 API calls 2 library calls 86362->86392 86366 401c62 Shell_NotifyIconW 86363->86366 86365 427289 86366->86367 86367->86317 86393 4115d7 86368->86393 86374 426daa 86373->86374 86375 40216b _wcslen 86373->86375 86431 40c600 86374->86431 86378 402180 86375->86378 86379 40219e 86375->86379 86377 426db5 86377->86354 86430 403bd0 52 API calls moneypunct 86378->86430 86380 4013a0 52 API calls 86379->86380 86382 4021a5 86380->86382 86384 426db7 86382->86384 86385 4115d7 52 API calls 86382->86385 86383 402187 _memmove 86383->86354 86385->86383 86386->86363 86388 40e0b2 86387->86388 86389 40e0a8 86387->86389 86388->86363 86443 403c30 52 API calls _memmove 86389->86443 86391->86361 86392->86365 86395 4115e1 _malloc 86393->86395 86396 4013e4 86395->86396 86400 4115fd std::exception::exception 86395->86400 86407 4135bb 86395->86407 86404 4013a0 86396->86404 86397 41163b 86422 4180af 46 API calls std::exception::operator= 86397->86422 86399 411645 86423 418105 RaiseException 86399->86423 86400->86397 86421 41130a 51 API calls __cinit 86400->86421 86403 411656 86405 4115d7 52 API calls 86404->86405 86406 4013a7 86405->86406 86406->86350 86406->86351 86408 413638 _malloc 86407->86408 86411 4135c9 _malloc 86407->86411 86429 417f77 46 API calls __getptd_noexit 86408->86429 86409 4135d4 86409->86411 86424 418901 46 API calls 2 library calls 86409->86424 86425 418752 46 API calls 8 library calls 86409->86425 86426 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86409->86426 86411->86409 86413 4135f7 RtlAllocateHeap 86411->86413 86416 413624 86411->86416 86419 413622 86411->86419 86413->86411 86414 413630 86413->86414 86414->86395 86427 417f77 46 API calls __getptd_noexit 86416->86427 86428 417f77 46 API calls __getptd_noexit 86419->86428 86421->86397 86422->86399 86423->86403 86424->86409 86425->86409 86427->86419 86428->86414 86429->86414 86430->86383 86432 40c619 86431->86432 86433 40c60a 86431->86433 86432->86377 86433->86432 86436 4026f0 86433->86436 86435 426d7a _memmove 86435->86377 86437 426873 86436->86437 86438 4026ff 86436->86438 86439 4013a0 52 API calls 86437->86439 86438->86435 86440 42687b 86439->86440 86441 4115d7 52 API calls 86440->86441 86442 42689e _memmove 86441->86442 86442->86435 86443->86388 86444->86339 86445 40bd20 86446 428194 86445->86446 86447 40bd2d 86445->86447 86449 40bd43 86446->86449 86451 4281bc 86446->86451 86453 4281b2 86446->86453 86448 40bd37 86447->86448 86468 4531b1 85 API calls 5 library calls 86447->86468 86457 40bd50 86448->86457 86467 45e987 86 API calls moneypunct 86451->86467 86466 40b510 VariantClear 86453->86466 86456 4281ba 86458 426cf1 86457->86458 86459 40bd63 86457->86459 86478 44cde9 52 API calls _memmove 86458->86478 86469 40bd80 86459->86469 86462 426cfc 86464 40e0a0 52 API calls 86462->86464 86463 40bd73 86463->86449 86465 426d02 86464->86465 86466->86456 86467->86447 86468->86448 86470 40bd8e 86469->86470 86477 40bdb7 _memmove 86469->86477 86471 40bded 86470->86471 86472 40bdad 86470->86472 86470->86477 86473 4115d7 52 API calls 86471->86473 86479 402f00 86472->86479 86475 40bdf6 86473->86475 86476 4115d7 52 API calls 86475->86476 86475->86477 86476->86477 86477->86463 86478->86462 86480 402f0c 86479->86480 86481 402f10 86479->86481 86480->86477 86482 4268c3 86481->86482 86483 4115d7 52 API calls 86481->86483 86484 402f51 moneypunct _memmove 86483->86484 86484->86477 86485 425ba2 86490 40e360 86485->86490 86487 425bb4 86506 41130a 51 API calls __cinit 86487->86506 86489 425bbe 86491 4115d7 52 API calls 86490->86491 86492 40e3ec GetModuleFileNameW 86491->86492 86507 413a0e 86492->86507 86494 40e421 _wcsncat 86510 413a9e 86494->86510 86497 4115d7 52 API calls 86498 40e45e _wcscpy 86497->86498 86513 40bc70 86498->86513 86502 40e4a9 86502->86487 86503 401c90 52 API calls 86505 40e4a1 _wcscat _wcslen _wcsncpy 86503->86505 86504 4115d7 52 API calls 86504->86505 86505->86502 86505->86503 86505->86504 86506->86489 86532 413801 86507->86532 86562 419efd 86510->86562 86514 4115d7 52 API calls 86513->86514 86515 40bc98 86514->86515 86516 4115d7 52 API calls 86515->86516 86517 40bca6 86516->86517 86518 40e4c0 86517->86518 86574 403350 86518->86574 86520 40e4cb RegOpenKeyExW 86521 427190 RegQueryValueExW 86520->86521 86522 40e4eb 86520->86522 86523 4271b0 86521->86523 86524 42721a RegCloseKey 86521->86524 86522->86505 86525 4115d7 52 API calls 86523->86525 86524->86505 86526 4271cb 86525->86526 86581 43652f 52 API calls 86526->86581 86528 4271d8 RegQueryValueExW 86529 42720e 86528->86529 86530 4271f7 86528->86530 86529->86524 86531 402160 52 API calls 86530->86531 86531->86529 86533 41389e 86532->86533 86539 41381a 86532->86539 86534 4139e8 86533->86534 86536 413a00 86533->86536 86559 417f77 46 API calls __getptd_noexit 86534->86559 86561 417f77 46 API calls __getptd_noexit 86536->86561 86537 4139ed 86560 417f25 10 API calls __wcsnicmp 86537->86560 86539->86533 86547 41388a 86539->86547 86554 419e30 46 API calls 2 library calls 86539->86554 86541 413967 86541->86494 86542 413909 86544 41396c 86542->86544 86545 413929 86542->86545 86544->86533 86544->86541 86548 41397a 86544->86548 86545->86533 86546 413945 86545->86546 86556 419e30 46 API calls 2 library calls 86545->86556 86546->86533 86546->86541 86551 41395b 86546->86551 86547->86533 86547->86542 86555 419e30 46 API calls 2 library calls 86547->86555 86558 419e30 46 API calls 2 library calls 86548->86558 86557 419e30 46 API calls 2 library calls 86551->86557 86554->86547 86555->86542 86556->86546 86557->86541 86558->86541 86559->86537 86560->86541 86561->86541 86563 419f13 86562->86563 86564 419f0e 86562->86564 86571 417f77 46 API calls __getptd_noexit 86563->86571 86564->86563 86565 419f2b 86564->86565 86570 40e454 86565->86570 86573 417f77 46 API calls __getptd_noexit 86565->86573 86567 419f18 86572 417f25 10 API calls __wcsnicmp 86567->86572 86570->86497 86571->86567 86572->86570 86573->86567 86575 403367 86574->86575 86576 403358 86574->86576 86577 4115d7 52 API calls 86575->86577 86576->86520 86578 403370 86577->86578 86579 4115d7 52 API calls 86578->86579 86580 40339e 86579->86580 86580->86520 86581->86528 86582 437081 VariantClear 86583 416454 86620 416c70 86583->86620 86585 416460 GetStartupInfoW 86586 416474 86585->86586 86621 419d5a HeapCreate 86586->86621 86588 4164cd 86589 4164d8 86588->86589 86705 41642b 46 API calls 3 library calls 86588->86705 86622 417c20 GetModuleHandleW 86589->86622 86592 4164de 86594 4164e9 __RTC_Initialize 86592->86594 86706 41642b 46 API calls 3 library calls 86592->86706 86641 41aaa1 GetStartupInfoW 86594->86641 86597 416503 GetCommandLineW 86654 41f584 GetEnvironmentStringsW 86597->86654 86601 416513 86660 41f4d6 GetModuleFileNameW 86601->86660 86603 41651d 86604 416528 86603->86604 86708 411924 46 API calls 3 library calls 86603->86708 86664 41f2a4 86604->86664 86607 41652e 86608 416539 86607->86608 86709 411924 46 API calls 3 library calls 86607->86709 86678 411703 86608->86678 86611 416541 86613 41654c __wwincmdln 86611->86613 86710 411924 46 API calls 3 library calls 86611->86710 86682 40d6b0 86613->86682 86616 41657c 86712 411906 46 API calls _doexit 86616->86712 86619 416581 __tzset_nolock 86620->86585 86621->86588 86623 417c34 86622->86623 86624 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86622->86624 86713 4178ff 49 API calls _free 86623->86713 86626 417c87 TlsAlloc 86624->86626 86629 417cd5 TlsSetValue 86626->86629 86630 417d96 86626->86630 86627 417c39 86627->86592 86629->86630 86631 417ce6 __init_pointers 86629->86631 86630->86592 86714 418151 InitializeCriticalSectionAndSpinCount 86631->86714 86633 417d91 86722 4178ff 49 API calls _free 86633->86722 86635 417d2a 86635->86633 86715 416b49 86635->86715 86638 417d76 86721 41793c 46 API calls 4 library calls 86638->86721 86640 417d7e GetCurrentThreadId 86640->86630 86642 416b49 __calloc_crt 46 API calls 86641->86642 86644 41aabf 86642->86644 86643 4164f7 86643->86597 86707 411924 46 API calls 3 library calls 86643->86707 86644->86643 86646 41ac34 86644->86646 86647 416b49 __calloc_crt 46 API calls 86644->86647 86653 41abb4 86644->86653 86645 41ac6a GetStdHandle 86645->86646 86646->86645 86648 41acce SetHandleCount 86646->86648 86649 41ac7c GetFileType 86646->86649 86652 41aca2 InitializeCriticalSectionAndSpinCount 86646->86652 86647->86644 86648->86643 86649->86646 86650 41abe0 GetFileType 86651 41abeb InitializeCriticalSectionAndSpinCount 86650->86651 86650->86653 86651->86643 86651->86653 86652->86643 86652->86646 86653->86646 86653->86650 86653->86651 86655 41f595 86654->86655 86656 41f599 86654->86656 86655->86601 86732 416b04 86656->86732 86658 41f5bb _memmove 86659 41f5c2 FreeEnvironmentStringsW 86658->86659 86659->86601 86661 41f50b _wparse_cmdline 86660->86661 86662 416b04 __malloc_crt 46 API calls 86661->86662 86663 41f54e _wparse_cmdline 86661->86663 86662->86663 86663->86603 86665 41f2bc _wcslen 86664->86665 86669 41f2b4 86664->86669 86666 416b49 __calloc_crt 46 API calls 86665->86666 86671 41f2e0 _wcslen 86666->86671 86667 41f336 86739 413748 86667->86739 86669->86607 86670 416b49 __calloc_crt 46 API calls 86670->86671 86671->86667 86671->86669 86671->86670 86672 41f35c 86671->86672 86675 41f373 86671->86675 86738 41ef12 46 API calls 2 library calls 86671->86738 86673 413748 _free 46 API calls 86672->86673 86673->86669 86745 417ed3 86675->86745 86677 41f37f 86677->86607 86679 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86678->86679 86681 411750 __IsNonwritableInCurrentImage 86679->86681 86764 41130a 51 API calls __cinit 86679->86764 86681->86611 86683 42e2f3 86682->86683 86684 40d6cc 86682->86684 86765 408f40 86684->86765 86686 40d707 86769 40ebb0 86686->86769 86693 40d751 86784 40f4e0 SystemParametersInfoW SystemParametersInfoW 86693->86784 86694 40d737 86772 411951 86694->86772 86696 40d75f 86785 40d590 GetCurrentDirectoryW 86696->86785 86698 40d767 SystemParametersInfoW 86699 40d794 86698->86699 86700 40d78d FreeLibrary 86698->86700 86701 408f40 VariantClear 86699->86701 86700->86699 86702 40d79d 86701->86702 86703 408f40 VariantClear 86702->86703 86704 40d7a6 86703->86704 86704->86616 86711 4118da 46 API calls _doexit 86704->86711 86705->86589 86706->86594 86711->86616 86712->86619 86713->86627 86714->86635 86717 416b52 86715->86717 86718 416b8f 86717->86718 86719 416b70 Sleep 86717->86719 86723 41f677 86717->86723 86718->86633 86718->86638 86720 416b85 86719->86720 86720->86717 86720->86718 86721->86640 86722->86630 86724 41f683 86723->86724 86730 41f69e _malloc 86723->86730 86725 41f68f 86724->86725 86724->86730 86731 417f77 46 API calls __getptd_noexit 86725->86731 86727 41f6b1 HeapAlloc 86729 41f6d8 86727->86729 86727->86730 86728 41f694 86728->86717 86729->86717 86730->86727 86730->86729 86731->86728 86733 416b0d 86732->86733 86734 4135bb _malloc 45 API calls 86733->86734 86735 416b43 86733->86735 86736 416b24 Sleep 86733->86736 86734->86733 86735->86658 86737 416b39 86736->86737 86737->86733 86737->86735 86738->86671 86740 413753 RtlFreeHeap 86739->86740 86744 41377c _free 86739->86744 86741 413768 86740->86741 86740->86744 86748 417f77 46 API calls __getptd_noexit 86741->86748 86743 41376e GetLastError 86743->86744 86744->86669 86749 417daa 86745->86749 86748->86743 86750 417dc9 __cftoa_l __call_reportfault 86749->86750 86751 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86750->86751 86752 417eb5 __call_reportfault 86751->86752 86755 41a208 86752->86755 86754 417ed1 GetCurrentProcess TerminateProcess 86754->86677 86756 41a210 86755->86756 86757 41a212 IsDebuggerPresent 86755->86757 86756->86754 86763 41fe19 86757->86763 86760 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86761 421ff0 __call_reportfault 86760->86761 86762 421ff8 GetCurrentProcess TerminateProcess 86760->86762 86761->86762 86762->86754 86763->86760 86764->86681 86767 408f48 moneypunct 86765->86767 86766 4265c7 VariantClear 86768 408f55 moneypunct 86766->86768 86767->86766 86767->86768 86768->86686 86825 40ebd0 86769->86825 86829 4182cb 86772->86829 86774 41195e 86836 4181f2 LeaveCriticalSection 86774->86836 86776 40d748 86777 4119b0 86776->86777 86778 4119d6 86777->86778 86779 4119bc 86777->86779 86778->86693 86779->86778 86871 417f77 46 API calls __getptd_noexit 86779->86871 86781 4119c6 86872 417f25 10 API calls __wcsnicmp 86781->86872 86783 4119d1 86783->86693 86784->86696 86873 401f20 86785->86873 86787 40d5b6 IsDebuggerPresent 86788 40d5c4 86787->86788 86789 42e1bb MessageBoxA 86787->86789 86790 42e1d4 86788->86790 86791 40d5e3 86788->86791 86789->86790 87045 403a50 52 API calls 3 library calls 86790->87045 86943 40f520 86791->86943 86795 40d5fd GetFullPathNameW 86955 401460 86795->86955 86797 40d63b 86798 40d643 86797->86798 86800 42e231 SetCurrentDirectoryW 86797->86800 86799 40d64c 86798->86799 87046 432fee 6 API calls 86798->87046 86970 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86799->86970 86800->86798 86803 42e252 86803->86799 86805 42e25a GetModuleFileNameW 86803->86805 86807 42e274 86805->86807 86808 42e2cb GetForegroundWindow ShellExecuteW 86805->86808 87047 401b10 86807->87047 86812 40d688 86808->86812 86809 40d656 86811 40d669 86809->86811 86814 40e0c0 74 API calls 86809->86814 86978 4091e0 86811->86978 86818 40d692 SetCurrentDirectoryW 86812->86818 86814->86811 86818->86698 86819 42e28d 87054 40d200 52 API calls 2 library calls 86819->87054 86822 42e299 GetForegroundWindow ShellExecuteW 86823 42e2c6 86822->86823 86823->86812 86824 40ec00 LoadLibraryA GetProcAddress 86824->86694 86826 40d72e 86825->86826 86827 40ebd6 LoadLibraryA 86825->86827 86826->86694 86826->86824 86827->86826 86828 40ebe7 GetProcAddress 86827->86828 86828->86826 86830 4182e0 86829->86830 86831 4182f3 EnterCriticalSection 86829->86831 86837 418209 86830->86837 86831->86774 86833 4182e6 86833->86831 86864 411924 46 API calls 3 library calls 86833->86864 86836->86776 86838 418215 __tzset_nolock 86837->86838 86839 418225 86838->86839 86840 41823d 86838->86840 86865 418901 46 API calls 2 library calls 86839->86865 86842 416b04 __malloc_crt 45 API calls 86840->86842 86848 41824b __tzset_nolock 86840->86848 86844 418256 86842->86844 86843 41822a 86866 418752 46 API calls 8 library calls 86843->86866 86846 41825d 86844->86846 86847 41826c 86844->86847 86868 417f77 46 API calls __getptd_noexit 86846->86868 86851 4182cb __lock 45 API calls 86847->86851 86848->86833 86849 418231 86867 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86849->86867 86853 418273 86851->86853 86855 4182a6 86853->86855 86856 41827b InitializeCriticalSectionAndSpinCount 86853->86856 86857 413748 _free 45 API calls 86855->86857 86858 418297 86856->86858 86859 41828b 86856->86859 86857->86858 86870 4182c2 LeaveCriticalSection _doexit 86858->86870 86860 413748 _free 45 API calls 86859->86860 86862 418291 86860->86862 86869 417f77 46 API calls __getptd_noexit 86862->86869 86865->86843 86866->86849 86868->86848 86869->86858 86870->86848 86871->86781 86872->86783 87055 40e6e0 86873->87055 86877 401f41 GetModuleFileNameW 87073 410100 86877->87073 86879 401f5c 87085 410960 86879->87085 86882 401b10 52 API calls 86883 401f81 86882->86883 87088 401980 86883->87088 86885 401f8e 86886 408f40 VariantClear 86885->86886 86887 401f9d 86886->86887 86888 401b10 52 API calls 86887->86888 86889 401fb4 86888->86889 86890 401980 53 API calls 86889->86890 86891 401fc3 86890->86891 86892 401b10 52 API calls 86891->86892 86893 401fd2 86892->86893 87096 40c2c0 86893->87096 86895 401fe1 86896 40bc70 52 API calls 86895->86896 86897 401ff3 86896->86897 87114 401a10 86897->87114 86899 401ffe 87121 4114ab 86899->87121 86902 428b05 86904 401a10 52 API calls 86902->86904 86903 402017 86905 4114ab __wcsicoll 58 API calls 86903->86905 86906 428b18 86904->86906 86907 402022 86905->86907 86909 401a10 52 API calls 86906->86909 86907->86906 86908 40202d 86907->86908 86910 4114ab __wcsicoll 58 API calls 86908->86910 86911 428b33 86909->86911 86912 402038 86910->86912 86914 428b3b GetModuleFileNameW 86911->86914 86913 402043 86912->86913 86912->86914 86915 4114ab __wcsicoll 58 API calls 86913->86915 86916 401a10 52 API calls 86914->86916 86917 40204e 86915->86917 86918 428b6c 86916->86918 86919 402092 86917->86919 86924 401a10 52 API calls 86917->86924 86926 428b90 _wcscpy 86917->86926 86920 40e0a0 52 API calls 86918->86920 86922 4020a3 86919->86922 86919->86926 86921 428b7a 86920->86921 86925 401a10 52 API calls 86921->86925 86923 428bc6 86922->86923 87129 40e830 53 API calls 86922->87129 86928 402073 _wcscpy 86924->86928 86929 428b88 86925->86929 86930 401a10 52 API calls 86926->86930 86934 401a10 52 API calls 86928->86934 86929->86926 86938 4020d0 86930->86938 86931 4020bb 87130 40cf00 53 API calls 86931->87130 86933 4020c6 86935 408f40 VariantClear 86933->86935 86934->86919 86935->86938 86936 402110 86940 408f40 VariantClear 86936->86940 86938->86936 86942 401a10 52 API calls 86938->86942 87131 40cf00 53 API calls 86938->87131 87132 40e6a0 53 API calls 86938->87132 86941 402120 moneypunct 86940->86941 86941->86787 86942->86938 86944 40f53c 86943->86944 86946 4295c9 __cftoa_l 86943->86946 87811 410120 86944->87811 86948 4295d9 GetOpenFileNameW 86946->86948 86947 40f545 87815 4102b0 SHGetMalloc 86947->87815 86948->86944 86950 40d5f5 86948->86950 86950->86795 86950->86797 86951 40f54c 87820 410190 GetFullPathNameW 86951->87820 86953 40f559 87831 40f570 86953->87831 87885 402400 86955->87885 86957 40146f 86960 428c29 _wcscat 86957->86960 87894 401500 86957->87894 86959 40147c 86959->86960 87902 40d440 86959->87902 86962 401489 86962->86960 86963 401491 GetFullPathNameW 86962->86963 86964 402160 52 API calls 86963->86964 86965 4014bb 86964->86965 86966 402160 52 API calls 86965->86966 86967 4014c8 86966->86967 86967->86960 86968 402160 52 API calls 86967->86968 86969 4014ee 86968->86969 86969->86797 86971 428361 86970->86971 86972 4103fc LoadImageW RegisterClassExW 86970->86972 87922 44395e EnumResourceNamesW LoadImageW 86971->87922 87921 410490 7 API calls 86972->87921 86975 428368 86976 40d651 86977 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86976->86977 86977->86809 86979 409202 86978->86979 86980 42d7ad 86978->86980 87037 409216 moneypunct 86979->87037 88194 410940 330 API calls 86979->88194 88197 45e737 90 API calls 3 library calls 86980->88197 86983 409386 86984 40939c 86983->86984 88195 40f190 10 API calls 86983->88195 86984->86812 87044 401000 Shell_NotifyIconW __cftoa_l 86984->87044 86986 4095b2 86986->86984 86987 4095bf 86986->86987 88196 401a50 330 API calls 86987->88196 86988 409253 PeekMessageW 86988->87037 86990 42d8cd Sleep 86990->87037 86991 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86991->86984 86994 4095f9 86991->86994 86993 42e13b 88215 40d410 VariantClear 86993->88215 86996 42e158 TranslateMessage DispatchMessageW GetMessageW 86994->86996 86996->86996 86999 42e188 86996->86999 86998 409567 PeekMessageW 86998->87037 86999->86984 87002 44c29d 52 API calls 87042 4094e0 87002->87042 87003 46f3c1 107 API calls 87003->87037 87004 40e0a0 52 API calls 87004->87037 87005 46fdbf 108 API calls 87005->87042 87006 409551 TranslateMessage DispatchMessageW 87006->86998 87008 42dcd2 WaitForSingleObject 87009 42dcf0 GetExitCodeProcess CloseHandle 87008->87009 87008->87037 88204 40d410 VariantClear 87009->88204 87011 42dd3d Sleep 87011->87042 87012 47d33e 308 API calls 87012->87037 87015 4094cf Sleep 87015->87042 87017 42d94d timeGetTime 88200 465124 53 API calls 87017->88200 87019 40d410 VariantClear 87019->87037 87020 40c620 timeGetTime 87020->87042 87023 465124 53 API calls 87023->87042 87024 42dd89 CloseHandle 87024->87042 87026 42de19 GetExitCodeProcess CloseHandle 87026->87042 87028 401b10 52 API calls 87028->87042 87031 42de88 Sleep 87031->87037 87033 45e737 90 API calls 87033->87037 87036 42e0cc VariantClear 87036->87037 87037->86983 87037->86988 87037->86990 87037->86993 87037->86998 87037->87003 87037->87004 87037->87006 87037->87008 87037->87011 87037->87012 87037->87015 87037->87017 87037->87019 87037->87033 87037->87036 87038 408f40 VariantClear 87037->87038 87037->87042 87923 4091b0 87037->87923 87981 40afa0 87037->87981 88007 408fc0 87037->88007 88042 408cc0 87037->88042 88056 40d150 87037->88056 88061 40d170 87037->88061 88067 4096a0 87037->88067 88198 465124 53 API calls 87037->88198 88199 40c620 timeGetTime 87037->88199 88214 40e270 VariantClear moneypunct 87037->88214 87038->87037 87040 401980 53 API calls 87040->87042 87042->87002 87042->87005 87042->87020 87042->87023 87042->87024 87042->87026 87042->87028 87042->87031 87042->87037 87042->87040 87043 408f40 VariantClear 87042->87043 88201 45178a 54 API calls 87042->88201 88202 47d33e 330 API calls 87042->88202 88203 453bc6 54 API calls 87042->88203 88205 40d410 VariantClear 87042->88205 88206 443d19 67 API calls _wcslen 87042->88206 88207 4574b4 VariantClear 87042->88207 88208 403cd0 87042->88208 88212 4731e1 VariantClear 87042->88212 88213 4331a2 6 API calls 87042->88213 87043->87042 87044->86812 87045->86797 87046->86803 87048 401b16 _wcslen 87047->87048 87049 4115d7 52 API calls 87048->87049 87052 401b63 87048->87052 87050 401b4b _memmove 87049->87050 87051 4115d7 52 API calls 87050->87051 87051->87052 87053 40d200 52 API calls 2 library calls 87052->87053 87053->86819 87054->86822 87056 40bc70 52 API calls 87055->87056 87057 401f31 87056->87057 87058 402560 87057->87058 87059 40256d __write_nolock 87058->87059 87060 402160 52 API calls 87059->87060 87062 402593 87060->87062 87072 4025bd 87062->87072 87133 401c90 87062->87133 87063 4026f0 52 API calls 87063->87072 87064 4026a7 87065 401b10 52 API calls 87064->87065 87071 4026db 87064->87071 87067 4026d1 87065->87067 87066 401b10 52 API calls 87066->87072 87137 40d7c0 52 API calls 2 library calls 87067->87137 87068 401c90 52 API calls 87068->87072 87071->86877 87072->87063 87072->87064 87072->87066 87072->87068 87136 40d7c0 52 API calls 2 library calls 87072->87136 87138 40f760 87073->87138 87076 410118 87076->86879 87078 42805d 87079 42806a 87078->87079 87194 431e58 87078->87194 87080 413748 _free 46 API calls 87079->87080 87082 428078 87080->87082 87083 431e58 82 API calls 87082->87083 87084 428084 87083->87084 87084->86879 87086 4115d7 52 API calls 87085->87086 87087 401f74 87086->87087 87087->86882 87089 4019a3 87088->87089 87093 401985 87088->87093 87090 4019b8 87089->87090 87089->87093 87800 403e10 53 API calls 87090->87800 87092 40199f 87092->86885 87093->87092 87799 403e10 53 API calls 87093->87799 87094 4019c4 87094->86885 87097 40c2c7 87096->87097 87098 40c30e 87096->87098 87099 40c2d3 87097->87099 87100 426c79 87097->87100 87101 40c315 87098->87101 87102 426c2b 87098->87102 87801 403ea0 52 API calls __cinit 87099->87801 87806 4534e3 52 API calls 87100->87806 87106 40c321 87101->87106 87107 426c5a 87101->87107 87104 426c4b 87102->87104 87105 426c2e 87102->87105 87804 4534e3 52 API calls 87104->87804 87113 40c2de 87105->87113 87803 4534e3 52 API calls 87105->87803 87802 403ea0 52 API calls __cinit 87106->87802 87805 4534e3 52 API calls 87107->87805 87113->86895 87113->87113 87115 401a30 87114->87115 87116 401a17 87114->87116 87118 402160 52 API calls 87115->87118 87117 401a2d 87116->87117 87807 403c30 52 API calls _memmove 87116->87807 87117->86899 87120 401a3d 87118->87120 87120->86899 87122 411523 87121->87122 87123 4114ba 87121->87123 87810 4113a8 58 API calls 4 library calls 87122->87810 87128 40200c 87123->87128 87808 417f77 46 API calls __getptd_noexit 87123->87808 87126 4114c6 87809 417f25 10 API calls __wcsnicmp 87126->87809 87128->86902 87128->86903 87129->86931 87130->86933 87131->86938 87132->86938 87134 4026f0 52 API calls 87133->87134 87135 401c97 87134->87135 87135->87062 87136->87072 87137->87071 87198 40f6f0 87138->87198 87140 40f77b _strcat moneypunct 87206 40f850 87140->87206 87145 427c2a 87235 414d04 87145->87235 87147 40f7fc 87147->87145 87149 40f804 87147->87149 87222 414a46 87149->87222 87153 40f80e 87153->87076 87157 4528bd 87153->87157 87154 427c59 87241 414fe2 87154->87241 87156 427c79 87158 4150d1 _fseek 81 API calls 87157->87158 87159 452930 87158->87159 87741 452719 87159->87741 87162 452948 87162->87078 87163 414d04 __fread_nolock 61 API calls 87164 452966 87163->87164 87165 414d04 __fread_nolock 61 API calls 87164->87165 87166 452976 87165->87166 87167 414d04 __fread_nolock 61 API calls 87166->87167 87168 45298f 87167->87168 87169 414d04 __fread_nolock 61 API calls 87168->87169 87170 4529aa 87169->87170 87171 4150d1 _fseek 81 API calls 87170->87171 87172 4529c4 87171->87172 87173 4135bb _malloc 46 API calls 87172->87173 87174 4529cf 87173->87174 87175 4135bb _malloc 46 API calls 87174->87175 87176 4529db 87175->87176 87177 414d04 __fread_nolock 61 API calls 87176->87177 87178 4529ec 87177->87178 87179 44afef GetSystemTimeAsFileTime 87178->87179 87180 452a00 87179->87180 87181 452a36 87180->87181 87182 452a13 87180->87182 87184 452aa5 87181->87184 87185 452a3c 87181->87185 87183 413748 _free 46 API calls 87182->87183 87187 452a1c 87183->87187 87186 413748 _free 46 API calls 87184->87186 87747 44b1a9 87185->87747 87189 452aa3 87186->87189 87190 413748 _free 46 API calls 87187->87190 87189->87078 87192 452a25 87190->87192 87191 452a9d 87193 413748 _free 46 API calls 87191->87193 87192->87078 87193->87189 87195 431e64 87194->87195 87197 431e6a 87194->87197 87196 414a46 __fcloseall 82 API calls 87195->87196 87196->87197 87197->87079 87199 425de2 87198->87199 87201 40f6fc _wcslen 87198->87201 87199->87140 87200 40f710 WideCharToMultiByte 87202 40f756 87200->87202 87203 40f728 87200->87203 87201->87200 87202->87140 87204 4115d7 52 API calls 87203->87204 87205 40f735 WideCharToMultiByte 87204->87205 87205->87140 87208 40f85d __cftoa_l _strlen 87206->87208 87209 40f7ab 87208->87209 87254 414db8 87208->87254 87210 4149c2 87209->87210 87269 414904 87210->87269 87212 40f7e9 87212->87145 87213 40f5c0 87212->87213 87218 40f5cd _strcat __write_nolock _memmove 87213->87218 87214 414d04 __fread_nolock 61 API calls 87214->87218 87215 40f691 __tzset_nolock 87215->87147 87217 425d11 87219 4150d1 _fseek 81 API calls 87217->87219 87218->87214 87218->87215 87218->87217 87357 4150d1 87218->87357 87220 425d33 87219->87220 87221 414d04 __fread_nolock 61 API calls 87220->87221 87221->87215 87223 414a52 __tzset_nolock 87222->87223 87224 414a64 87223->87224 87225 414a79 87223->87225 87497 417f77 46 API calls __getptd_noexit 87224->87497 87227 415471 __lock_file 47 API calls 87225->87227 87232 414a74 __tzset_nolock 87225->87232 87230 414a92 87227->87230 87228 414a69 87498 417f25 10 API calls __wcsnicmp 87228->87498 87481 4149d9 87230->87481 87232->87153 87566 414c76 87235->87566 87237 414d1c 87238 44afef 87237->87238 87734 442c5a 87238->87734 87240 44b00d 87240->87154 87242 414fee __tzset_nolock 87241->87242 87243 414ffa 87242->87243 87244 41500f 87242->87244 87738 417f77 46 API calls __getptd_noexit 87243->87738 87246 415471 __lock_file 47 API calls 87244->87246 87248 415017 87246->87248 87247 414fff 87739 417f25 10 API calls __wcsnicmp 87247->87739 87249 414e4e __ftell_nolock 51 API calls 87248->87249 87251 415024 87249->87251 87740 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87251->87740 87253 41500a __tzset_nolock 87253->87156 87255 414dd6 87254->87255 87256 414deb 87254->87256 87265 417f77 46 API calls __getptd_noexit 87255->87265 87256->87255 87257 414df2 87256->87257 87267 41b91b 79 API calls 13 library calls 87257->87267 87260 414ddb 87266 417f25 10 API calls __wcsnicmp 87260->87266 87262 414de6 87262->87208 87263 414e18 87263->87262 87268 418f98 77 API calls 5 library calls 87263->87268 87265->87260 87266->87262 87267->87263 87268->87262 87272 414910 __tzset_nolock 87269->87272 87270 414923 87325 417f77 46 API calls __getptd_noexit 87270->87325 87272->87270 87274 414951 87272->87274 87273 414928 87326 417f25 10 API calls __wcsnicmp 87273->87326 87288 41d4d1 87274->87288 87277 414956 87278 41496a 87277->87278 87279 41495d 87277->87279 87281 414992 87278->87281 87282 414972 87278->87282 87327 417f77 46 API calls __getptd_noexit 87279->87327 87305 41d218 87281->87305 87328 417f77 46 API calls __getptd_noexit 87282->87328 87285 414933 __tzset_nolock @_EH4_CallFilterFunc@8 87285->87212 87289 41d4dd __tzset_nolock 87288->87289 87290 4182cb __lock 46 API calls 87289->87290 87303 41d4eb 87290->87303 87291 41d560 87330 41d5fb 87291->87330 87292 41d567 87293 416b04 __malloc_crt 46 API calls 87292->87293 87295 41d56e 87293->87295 87295->87291 87297 41d57c InitializeCriticalSectionAndSpinCount 87295->87297 87296 41d5f0 __tzset_nolock 87296->87277 87298 41d59c 87297->87298 87299 41d5af EnterCriticalSection 87297->87299 87302 413748 _free 46 API calls 87298->87302 87299->87291 87300 418209 __mtinitlocknum 46 API calls 87300->87303 87302->87291 87303->87291 87303->87292 87303->87300 87333 4154b2 47 API calls __lock 87303->87333 87334 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87303->87334 87306 41d23a 87305->87306 87307 41d255 87306->87307 87319 41d26c __wopenfile 87306->87319 87339 417f77 46 API calls __getptd_noexit 87307->87339 87309 41d25a 87340 417f25 10 API calls __wcsnicmp 87309->87340 87310 41d421 87312 41d47a 87310->87312 87313 41d48c 87310->87313 87344 417f77 46 API calls __getptd_noexit 87312->87344 87336 422bf9 87313->87336 87316 41499d 87329 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87316->87329 87317 41d47f 87345 417f25 10 API calls __wcsnicmp 87317->87345 87319->87310 87319->87312 87319->87319 87341 41341f 58 API calls 3 library calls 87319->87341 87321 41d41a 87321->87310 87342 41341f 58 API calls 3 library calls 87321->87342 87323 41d439 87323->87310 87343 41341f 58 API calls 3 library calls 87323->87343 87325->87273 87326->87285 87327->87285 87328->87285 87329->87285 87335 4181f2 LeaveCriticalSection 87330->87335 87332 41d602 87332->87296 87333->87303 87334->87303 87335->87332 87346 422b35 87336->87346 87338 422c14 87338->87316 87339->87309 87340->87316 87341->87321 87342->87323 87343->87310 87344->87317 87345->87316 87347 422b41 __tzset_nolock 87346->87347 87348 422b54 87347->87348 87350 422b8a 87347->87350 87349 417f77 __free_osfhnd 46 API calls 87348->87349 87351 422b59 87349->87351 87353 422400 __tsopen_nolock 109 API calls 87350->87353 87352 417f25 __wcsnicmp 10 API calls 87351->87352 87356 422b63 __tzset_nolock 87352->87356 87354 422ba4 87353->87354 87355 422bcb __wsopen_helper LeaveCriticalSection 87354->87355 87355->87356 87356->87338 87360 4150dd __tzset_nolock 87357->87360 87358 4150e9 87388 417f77 46 API calls __getptd_noexit 87358->87388 87360->87358 87361 41510f 87360->87361 87370 415471 87361->87370 87362 4150ee 87389 417f25 10 API calls __wcsnicmp 87362->87389 87369 4150f9 __tzset_nolock 87369->87218 87371 415483 87370->87371 87372 4154a5 EnterCriticalSection 87370->87372 87371->87372 87373 41548b 87371->87373 87374 415117 87372->87374 87375 4182cb __lock 46 API calls 87373->87375 87376 415047 87374->87376 87375->87374 87377 415067 87376->87377 87378 415057 87376->87378 87383 415079 87377->87383 87391 414e4e 87377->87391 87446 417f77 46 API calls __getptd_noexit 87378->87446 87382 41505c 87390 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87382->87390 87408 41443c 87383->87408 87386 4150b9 87421 41e1f4 87386->87421 87388->87362 87389->87369 87390->87369 87392 414e61 87391->87392 87393 414e79 87391->87393 87447 417f77 46 API calls __getptd_noexit 87392->87447 87395 414139 __flsbuf 46 API calls 87393->87395 87397 414e80 87395->87397 87396 414e66 87448 417f25 10 API calls __wcsnicmp 87396->87448 87399 41e1f4 __write 51 API calls 87397->87399 87400 414e97 87399->87400 87401 414f09 87400->87401 87403 414ec9 87400->87403 87407 414e71 87400->87407 87449 417f77 46 API calls __getptd_noexit 87401->87449 87404 41e1f4 __write 51 API calls 87403->87404 87403->87407 87405 414f64 87404->87405 87406 41e1f4 __write 51 API calls 87405->87406 87405->87407 87406->87407 87407->87383 87409 414477 87408->87409 87410 414455 87408->87410 87414 414139 87409->87414 87410->87409 87411 414139 __flsbuf 46 API calls 87410->87411 87412 414470 87411->87412 87450 41b7b2 77 API calls 6 library calls 87412->87450 87415 414145 87414->87415 87416 41415a 87414->87416 87451 417f77 46 API calls __getptd_noexit 87415->87451 87416->87386 87418 41414a 87452 417f25 10 API calls __wcsnicmp 87418->87452 87420 414155 87420->87386 87422 41e200 __tzset_nolock 87421->87422 87423 41e223 87422->87423 87424 41e208 87422->87424 87425 41e22f 87423->87425 87431 41e269 87423->87431 87473 417f8a 46 API calls __getptd_noexit 87424->87473 87475 417f8a 46 API calls __getptd_noexit 87425->87475 87427 41e20d 87474 417f77 46 API calls __getptd_noexit 87427->87474 87430 41e234 87476 417f77 46 API calls __getptd_noexit 87430->87476 87453 41ae56 87431->87453 87434 41e26f 87436 41e291 87434->87436 87437 41e27d 87434->87437 87435 41e23c 87477 417f25 10 API calls __wcsnicmp 87435->87477 87478 417f77 46 API calls __getptd_noexit 87436->87478 87463 41e17f 87437->87463 87441 41e215 __tzset_nolock 87441->87382 87442 41e289 87480 41e2c0 LeaveCriticalSection __unlock_fhandle 87442->87480 87443 41e296 87479 417f8a 46 API calls __getptd_noexit 87443->87479 87446->87382 87447->87396 87448->87407 87449->87407 87450->87409 87451->87418 87452->87420 87454 41ae62 __tzset_nolock 87453->87454 87455 41aebc 87454->87455 87457 4182cb __lock 46 API calls 87454->87457 87456 41aec1 EnterCriticalSection 87455->87456 87458 41aede __tzset_nolock 87455->87458 87456->87458 87459 41ae8e 87457->87459 87458->87434 87460 41aeaa 87459->87460 87461 41ae97 InitializeCriticalSectionAndSpinCount 87459->87461 87462 41aeec ___lock_fhandle LeaveCriticalSection 87460->87462 87461->87460 87462->87455 87464 41aded __close_nolock 46 API calls 87463->87464 87465 41e18e 87464->87465 87466 41e1a4 SetFilePointer 87465->87466 87467 41e194 87465->87467 87469 41e1bb GetLastError 87466->87469 87471 41e1c3 87466->87471 87468 417f77 __free_osfhnd 46 API calls 87467->87468 87470 41e199 87468->87470 87469->87471 87470->87442 87471->87470 87472 417f9d __dosmaperr 46 API calls 87471->87472 87472->87470 87473->87427 87474->87441 87475->87430 87476->87435 87477->87441 87478->87443 87479->87442 87480->87441 87482 4149ea 87481->87482 87483 4149fe 87481->87483 87527 417f77 46 API calls __getptd_noexit 87482->87527 87485 4149fa 87483->87485 87487 41443c __flush 77 API calls 87483->87487 87499 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87485->87499 87486 4149ef 87528 417f25 10 API calls __wcsnicmp 87486->87528 87489 414a0a 87487->87489 87500 41d8c2 87489->87500 87492 414139 __flsbuf 46 API calls 87493 414a18 87492->87493 87504 41d7fe 87493->87504 87495 414a1e 87495->87485 87496 413748 _free 46 API calls 87495->87496 87496->87485 87497->87228 87498->87232 87499->87232 87501 41d8d2 87500->87501 87503 414a12 87500->87503 87502 413748 _free 46 API calls 87501->87502 87501->87503 87502->87503 87503->87492 87505 41d80a __tzset_nolock 87504->87505 87506 41d812 87505->87506 87507 41d82d 87505->87507 87544 417f8a 46 API calls __getptd_noexit 87506->87544 87509 41d839 87507->87509 87513 41d873 87507->87513 87546 417f8a 46 API calls __getptd_noexit 87509->87546 87511 41d817 87545 417f77 46 API calls __getptd_noexit 87511->87545 87512 41d83e 87547 417f77 46 API calls __getptd_noexit 87512->87547 87516 41ae56 ___lock_fhandle 48 API calls 87513->87516 87518 41d879 87516->87518 87517 41d846 87548 417f25 10 API calls __wcsnicmp 87517->87548 87520 41d893 87518->87520 87521 41d887 87518->87521 87549 417f77 46 API calls __getptd_noexit 87520->87549 87529 41d762 87521->87529 87522 41d81f __tzset_nolock 87522->87495 87525 41d88d 87550 41d8ba LeaveCriticalSection __unlock_fhandle 87525->87550 87527->87486 87528->87485 87551 41aded 87529->87551 87531 41d7c8 87564 41ad67 47 API calls __free_osfhnd 87531->87564 87533 41d772 87533->87531 87535 41aded __close_nolock 46 API calls 87533->87535 87543 41d7a6 87533->87543 87534 41d7d0 87542 41d7f2 87534->87542 87565 417f9d 46 API calls 2 library calls 87534->87565 87537 41d79d 87535->87537 87536 41aded __close_nolock 46 API calls 87538 41d7b2 CloseHandle 87536->87538 87540 41aded __close_nolock 46 API calls 87537->87540 87538->87531 87541 41d7be GetLastError 87538->87541 87540->87543 87541->87531 87542->87525 87543->87531 87543->87536 87544->87511 87545->87522 87546->87512 87547->87517 87548->87522 87549->87525 87550->87522 87552 41ae12 87551->87552 87553 41adfa 87551->87553 87556 417f8a __free_osfhnd 46 API calls 87552->87556 87557 41ae51 87552->87557 87554 417f8a __free_osfhnd 46 API calls 87553->87554 87555 41adff 87554->87555 87558 417f77 __free_osfhnd 46 API calls 87555->87558 87559 41ae23 87556->87559 87557->87533 87562 41ae07 87558->87562 87560 417f77 __free_osfhnd 46 API calls 87559->87560 87561 41ae2b 87560->87561 87563 417f25 __wcsnicmp 10 API calls 87561->87563 87562->87533 87563->87562 87564->87534 87565->87542 87567 414c82 __tzset_nolock 87566->87567 87568 414cc3 87567->87568 87569 414c96 __cftoa_l 87567->87569 87570 414cbb __tzset_nolock 87567->87570 87571 415471 __lock_file 47 API calls 87568->87571 87593 417f77 46 API calls __getptd_noexit 87569->87593 87570->87237 87573 414ccb 87571->87573 87579 414aba 87573->87579 87574 414cb0 87594 417f25 10 API calls __wcsnicmp 87574->87594 87580 414af2 87579->87580 87583 414ad8 __cftoa_l 87579->87583 87595 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87580->87595 87581 414ae2 87646 417f77 46 API calls __getptd_noexit 87581->87646 87583->87580 87583->87581 87586 414b2d 87583->87586 87586->87580 87587 414139 __flsbuf 46 API calls 87586->87587 87590 414c38 __cftoa_l 87586->87590 87596 41dfcc 87586->87596 87626 41d8f3 87586->87626 87648 41e0c2 46 API calls 4 library calls 87586->87648 87587->87586 87649 417f77 46 API calls __getptd_noexit 87590->87649 87592 414ae7 87647 417f25 10 API calls __wcsnicmp 87592->87647 87593->87574 87594->87570 87595->87570 87597 41dfd8 __tzset_nolock 87596->87597 87598 41dfe0 87597->87598 87599 41dffb 87597->87599 87719 417f8a 46 API calls __getptd_noexit 87598->87719 87601 41e007 87599->87601 87604 41e041 87599->87604 87721 417f8a 46 API calls __getptd_noexit 87601->87721 87602 41dfe5 87720 417f77 46 API calls __getptd_noexit 87602->87720 87608 41e063 87604->87608 87609 41e04e 87604->87609 87606 41e00c 87722 417f77 46 API calls __getptd_noexit 87606->87722 87612 41ae56 ___lock_fhandle 48 API calls 87608->87612 87724 417f8a 46 API calls __getptd_noexit 87609->87724 87610 41dfed __tzset_nolock 87610->87586 87614 41e069 87612->87614 87613 41e053 87725 417f77 46 API calls __getptd_noexit 87613->87725 87617 41e077 87614->87617 87618 41e08b 87614->87618 87650 41da15 87617->87650 87726 417f77 46 API calls __getptd_noexit 87618->87726 87621 41e014 87723 417f25 10 API calls __wcsnicmp 87621->87723 87622 41e083 87728 41e0ba LeaveCriticalSection __unlock_fhandle 87622->87728 87623 41e090 87727 417f8a 46 API calls __getptd_noexit 87623->87727 87627 41d900 87626->87627 87628 41d915 87626->87628 87732 417f77 46 API calls __getptd_noexit 87627->87732 87632 41d94a 87628->87632 87637 41d910 87628->87637 87729 420603 87628->87729 87630 41d905 87733 417f25 10 API calls __wcsnicmp 87630->87733 87634 414139 __flsbuf 46 API calls 87632->87634 87635 41d95e 87634->87635 87636 41dfcc __read 59 API calls 87635->87636 87638 41d965 87636->87638 87637->87586 87638->87637 87639 414139 __flsbuf 46 API calls 87638->87639 87640 41d988 87639->87640 87640->87637 87641 414139 __flsbuf 46 API calls 87640->87641 87642 41d994 87641->87642 87642->87637 87643 414139 __flsbuf 46 API calls 87642->87643 87644 41d9a1 87643->87644 87645 414139 __flsbuf 46 API calls 87644->87645 87645->87637 87646->87592 87647->87580 87648->87586 87649->87592 87651 41da31 87650->87651 87652 41da4c 87650->87652 87653 417f8a __free_osfhnd 46 API calls 87651->87653 87654 41da5b 87652->87654 87656 41da7a 87652->87656 87655 41da36 87653->87655 87657 417f8a __free_osfhnd 46 API calls 87654->87657 87659 417f77 __free_osfhnd 46 API calls 87655->87659 87658 41da98 87656->87658 87673 41daac 87656->87673 87660 41da60 87657->87660 87661 417f8a __free_osfhnd 46 API calls 87658->87661 87670 41da3e 87659->87670 87663 417f77 __free_osfhnd 46 API calls 87660->87663 87665 41da9d 87661->87665 87662 41db02 87664 417f8a __free_osfhnd 46 API calls 87662->87664 87666 41da67 87663->87666 87668 41db07 87664->87668 87669 417f77 __free_osfhnd 46 API calls 87665->87669 87667 417f25 __wcsnicmp 10 API calls 87666->87667 87667->87670 87671 417f77 __free_osfhnd 46 API calls 87668->87671 87672 41daa4 87669->87672 87670->87622 87671->87672 87676 417f25 __wcsnicmp 10 API calls 87672->87676 87673->87662 87673->87670 87674 41dae1 87673->87674 87675 41db1b 87673->87675 87674->87662 87677 41daec ReadFile 87674->87677 87679 416b04 __malloc_crt 46 API calls 87675->87679 87676->87670 87680 41dc17 87677->87680 87681 41df8f GetLastError 87677->87681 87682 41db31 87679->87682 87680->87681 87688 41dc2b 87680->87688 87683 41de16 87681->87683 87684 41df9c 87681->87684 87685 41db59 87682->87685 87686 41db3b 87682->87686 87692 417f9d __dosmaperr 46 API calls 87683->87692 87713 41dd9b 87683->87713 87690 417f77 __free_osfhnd 46 API calls 87684->87690 87689 420494 __lseeki64_nolock 48 API calls 87685->87689 87687 417f77 __free_osfhnd 46 API calls 87686->87687 87691 41db40 87687->87691 87698 41dc47 87688->87698 87704 41de5b 87688->87704 87688->87713 87693 41db67 87689->87693 87694 41dfa1 87690->87694 87696 417f8a __free_osfhnd 46 API calls 87691->87696 87692->87713 87693->87677 87695 417f8a __free_osfhnd 46 API calls 87694->87695 87695->87713 87696->87670 87697 413748 _free 46 API calls 87697->87670 87699 41dcab ReadFile 87698->87699 87708 41dd28 87698->87708 87701 41dcc9 GetLastError 87699->87701 87710 41dcd3 87699->87710 87700 41ded0 ReadFile 87702 41deef GetLastError 87700->87702 87711 41def9 87700->87711 87701->87698 87701->87710 87702->87704 87702->87711 87703 41ddec MultiByteToWideChar 87705 41de10 GetLastError 87703->87705 87703->87713 87704->87700 87704->87713 87705->87683 87706 41dda3 87714 41dd60 87706->87714 87715 41ddda 87706->87715 87707 41dd96 87709 417f77 __free_osfhnd 46 API calls 87707->87709 87708->87706 87708->87707 87708->87713 87708->87714 87709->87713 87710->87698 87716 420494 __lseeki64_nolock 48 API calls 87710->87716 87711->87704 87712 420494 __lseeki64_nolock 48 API calls 87711->87712 87712->87711 87713->87670 87713->87697 87714->87703 87717 420494 __lseeki64_nolock 48 API calls 87715->87717 87716->87710 87718 41dde9 87717->87718 87718->87703 87719->87602 87720->87610 87721->87606 87722->87621 87723->87610 87724->87613 87725->87621 87726->87623 87727->87622 87728->87610 87730 416b04 __malloc_crt 46 API calls 87729->87730 87731 420618 87730->87731 87731->87632 87732->87630 87733->87637 87737 4148b3 GetSystemTimeAsFileTime __aulldiv 87734->87737 87736 442c6b 87736->87240 87737->87736 87738->87247 87739->87253 87740->87253 87744 45272f __tzset_nolock _wcscpy 87741->87744 87742 4528a4 87742->87162 87742->87163 87743 414d04 61 API calls __fread_nolock 87743->87744 87744->87742 87744->87743 87745 44afef GetSystemTimeAsFileTime 87744->87745 87746 4150d1 81 API calls _fseek 87744->87746 87745->87744 87746->87744 87748 44b1bc 87747->87748 87749 44b1ca 87747->87749 87750 4149c2 116 API calls 87748->87750 87751 44b1e1 87749->87751 87752 4149c2 116 API calls 87749->87752 87753 44b1d8 87749->87753 87750->87749 87782 4321a4 87751->87782 87754 44b2db 87752->87754 87753->87191 87754->87751 87757 44b2e9 87754->87757 87756 44b224 87759 44b253 87756->87759 87760 44b228 87756->87760 87758 44b2f6 87757->87758 87762 414a46 __fcloseall 82 API calls 87757->87762 87758->87191 87786 43213d 87759->87786 87761 44b235 87760->87761 87764 414a46 __fcloseall 82 API calls 87760->87764 87765 44b245 87761->87765 87767 414a46 __fcloseall 82 API calls 87761->87767 87762->87758 87764->87761 87765->87191 87766 44b25a 87768 44b260 87766->87768 87769 44b289 87766->87769 87767->87765 87771 44b26d 87768->87771 87774 414a46 __fcloseall 82 API calls 87768->87774 87796 44b0bf 87 API calls 87769->87796 87772 44b27d 87771->87772 87775 414a46 __fcloseall 82 API calls 87771->87775 87772->87191 87773 44b28f 87797 4320f8 46 API calls _free 87773->87797 87774->87771 87775->87772 87777 44b295 87778 44b2a2 87777->87778 87779 414a46 __fcloseall 82 API calls 87777->87779 87780 44b2b2 87778->87780 87781 414a46 __fcloseall 82 API calls 87778->87781 87779->87778 87780->87191 87781->87780 87783 4321b4 __tzset_nolock _memmove 87782->87783 87784 4321cb 87782->87784 87783->87756 87785 414d04 __fread_nolock 61 API calls 87784->87785 87785->87783 87787 4135bb _malloc 46 API calls 87786->87787 87788 432150 87787->87788 87789 4135bb _malloc 46 API calls 87788->87789 87790 432162 87789->87790 87791 4135bb _malloc 46 API calls 87790->87791 87792 432174 87791->87792 87794 432189 87792->87794 87798 4320f8 46 API calls _free 87792->87798 87794->87766 87795 432198 87795->87766 87796->87773 87797->87777 87798->87795 87799->87092 87800->87094 87801->87113 87802->87113 87803->87113 87804->87107 87805->87113 87806->87113 87807->87117 87808->87126 87809->87128 87810->87128 87860 410160 87811->87860 87813 41012f GetFullPathNameW 87814 410147 moneypunct 87813->87814 87814->86947 87816 4102cb SHGetDesktopFolder 87815->87816 87819 410333 _wcsncpy 87815->87819 87817 4102e0 _wcsncpy 87816->87817 87816->87819 87818 41031c SHGetPathFromIDListW 87817->87818 87817->87819 87818->87819 87819->86951 87821 4101bb 87820->87821 87826 425f4a 87820->87826 87822 410160 52 API calls 87821->87822 87823 4101c7 87822->87823 87864 410200 52 API calls 2 library calls 87823->87864 87824 4114ab __wcsicoll 58 API calls 87824->87826 87826->87824 87828 425f6e 87826->87828 87827 4101d6 87865 410200 52 API calls 2 library calls 87827->87865 87828->86953 87830 4101e9 87830->86953 87832 40f760 128 API calls 87831->87832 87833 40f584 87832->87833 87834 429335 87833->87834 87835 40f58c 87833->87835 87838 4528bd 118 API calls 87834->87838 87836 40f598 87835->87836 87837 429358 87835->87837 87880 4033c0 109 API calls 7 library calls 87836->87880 87881 434034 86 API calls _wprintf 87837->87881 87840 42934b 87838->87840 87843 429373 87840->87843 87844 42934f 87840->87844 87842 40f5b4 87842->86950 87847 4115d7 52 API calls 87843->87847 87846 431e58 82 API calls 87844->87846 87845 429369 87845->87843 87846->87837 87859 4293c5 moneypunct 87847->87859 87848 42959c 87849 413748 _free 46 API calls 87848->87849 87850 4295a5 87849->87850 87851 431e58 82 API calls 87850->87851 87852 4295b1 87851->87852 87856 401b10 52 API calls 87856->87859 87859->87848 87859->87856 87866 402780 87859->87866 87874 4022d0 87859->87874 87882 444af8 52 API calls _memmove 87859->87882 87883 44c7dd 64 API calls 3 library calls 87859->87883 87884 44b41c 52 API calls 87859->87884 87861 410167 _wcslen 87860->87861 87862 4115d7 52 API calls 87861->87862 87863 41017e _wcscpy 87862->87863 87863->87813 87864->87827 87865->87830 87867 402827 87866->87867 87870 402790 moneypunct _memmove 87866->87870 87869 4115d7 52 API calls 87867->87869 87868 4115d7 52 API calls 87871 402797 87868->87871 87869->87870 87870->87868 87872 4115d7 52 API calls 87871->87872 87873 4027bd 87871->87873 87872->87873 87873->87859 87875 4022e0 87874->87875 87877 40239d 87874->87877 87876 4115d7 52 API calls 87875->87876 87875->87877 87878 402320 moneypunct 87875->87878 87876->87878 87877->87859 87878->87877 87879 4115d7 52 API calls 87878->87879 87879->87878 87880->87842 87881->87845 87882->87859 87883->87859 87884->87859 87886 402417 87885->87886 87890 402539 moneypunct 87885->87890 87887 4115d7 52 API calls 87886->87887 87886->87890 87888 402443 87887->87888 87889 4115d7 52 API calls 87888->87889 87892 4024b4 87889->87892 87890->86957 87892->87890 87893 4022d0 52 API calls 87892->87893 87914 402880 95 API calls 2 library calls 87892->87914 87893->87892 87898 401566 87894->87898 87895 401794 87915 40e9a0 90 API calls 87895->87915 87898->87895 87899 40167a 87898->87899 87900 4010a0 52 API calls 87898->87900 87901 4017c0 87899->87901 87916 45e737 90 API calls 3 library calls 87899->87916 87900->87898 87901->86959 87903 40bc70 52 API calls 87902->87903 87912 40d451 87903->87912 87904 40d50f 87919 410600 52 API calls 87904->87919 87906 427c01 87920 45e737 90 API calls 3 library calls 87906->87920 87907 40e0a0 52 API calls 87907->87912 87909 401b10 52 API calls 87909->87912 87910 40d519 87910->86962 87912->87904 87912->87906 87912->87907 87912->87909 87912->87910 87917 40f310 53 API calls 87912->87917 87918 40d860 91 API calls 87912->87918 87914->87892 87915->87899 87916->87901 87917->87912 87918->87912 87919->87910 87920->87910 87921->86976 87922->86975 87924 42c5fe 87923->87924 87939 4091c6 87923->87939 87925 40bc70 52 API calls 87924->87925 87924->87939 87926 42c64e InterlockedIncrement 87925->87926 87927 42c665 87926->87927 87932 42c697 87926->87932 87929 42c672 InterlockedDecrement Sleep InterlockedIncrement 87927->87929 87927->87932 87928 42c737 InterlockedDecrement 87930 42c74a 87928->87930 87929->87927 87929->87932 87933 408f40 VariantClear 87930->87933 87931 42c731 87931->87928 87932->87928 87932->87931 88216 408e80 87932->88216 87935 42c752 87933->87935 88229 410c60 87935->88229 87939->87037 87940 42c6db 87941 402160 52 API calls 87940->87941 87942 42c6e5 87941->87942 87943 45340c 85 API calls 87942->87943 87944 42c6f1 87943->87944 88226 40d200 52 API calls 2 library calls 87944->88226 87946 42c6fb 88227 465124 53 API calls 87946->88227 87948 42c715 87949 42c76a 87948->87949 87950 42c719 87948->87950 87951 401b10 52 API calls 87949->87951 88228 46fe32 VariantClear 87950->88228 87953 42c77e 87951->87953 87954 401980 53 API calls 87953->87954 87960 42c796 87954->87960 87955 42c812 88240 46fe32 VariantClear 87955->88240 87957 42c82a InterlockedDecrement 88241 46ff07 54 API calls 87957->88241 87959 42c864 88242 45e737 90 API calls 3 library calls 87959->88242 87960->87955 87960->87959 88234 40ba10 87960->88234 87962 42c9ec 87968 42c874 87971 408f40 VariantClear 87968->87971 87980 42ca59 87968->87980 87969 408f40 VariantClear 87972 42c849 87969->87972 87975 42c891 87971->87975 87972->87962 87972->87969 87973 402780 52 API calls 87972->87973 87978 401980 53 API calls 87972->87978 88243 40a780 87972->88243 87973->87972 87977 410c60 VariantClear 87975->87977 87977->87939 87978->87972 87980->87980 87982 40afc4 87981->87982 87983 40b156 87981->87983 87984 40afd5 87982->87984 87985 42d1e3 87982->87985 88299 45e737 90 API calls 3 library calls 87983->88299 87990 40a780 199 API calls 87984->87990 88006 40b11a moneypunct 87984->88006 88300 45e737 90 API calls 3 library calls 87985->88300 87988 40b143 87988->87037 87989 42d1f8 87994 408f40 VariantClear 87989->87994 87992 40b00a 87990->87992 87992->87989 87996 40b012 87992->87996 87993 42d4db 87993->87993 87994->87988 87995 40b04a 88003 40b05c moneypunct 87995->88003 88301 40e270 VariantClear moneypunct 87995->88301 87996->87995 87998 42d231 VariantClear 87996->87998 88000 40b094 moneypunct 87996->88000 87997 40b108 87997->88006 88302 40e270 VariantClear moneypunct 87997->88302 87998->88003 87999 42d45a VariantClear 87999->88006 88000->87997 88002 42d425 moneypunct 88000->88002 88002->87999 88002->88006 88003->88000 88004 4115d7 52 API calls 88003->88004 88004->88000 88006->87988 88303 45e737 90 API calls 3 library calls 88006->88303 88008 408fff 88007->88008 88018 40900d 88007->88018 88350 403ea0 52 API calls __cinit 88008->88350 88011 42c3f6 88353 45e737 90 API calls 3 library calls 88011->88353 88013 40a780 199 API calls 88013->88018 88014 42c44a 88355 45e737 90 API calls 3 library calls 88014->88355 88017 42c47b 88356 451b42 61 API calls 88017->88356 88018->88011 88018->88013 88018->88014 88018->88017 88019 42c4cb 88018->88019 88020 42c564 88018->88020 88026 42c548 88018->88026 88027 409112 88018->88027 88029 42c528 88018->88029 88031 4090df 88018->88031 88032 4090ea 88018->88032 88041 4090f2 moneypunct 88018->88041 88352 4534e3 52 API calls 88018->88352 88354 40c4e0 199 API calls 88018->88354 88304 47faae 88019->88304 88023 408f40 VariantClear 88020->88023 88023->88041 88024 42c491 88024->88041 88357 45e737 90 API calls 3 library calls 88024->88357 88025 42c4da 88025->88041 88358 45e737 90 API calls 3 library calls 88025->88358 88360 45e737 90 API calls 3 library calls 88026->88360 88027->88026 88034 40912b 88027->88034 88359 45e737 90 API calls 3 library calls 88029->88359 88031->88032 88036 408e80 VariantClear 88031->88036 88037 408f40 VariantClear 88032->88037 88034->88041 88351 403e10 53 API calls 88034->88351 88036->88032 88037->88041 88039 40914b 88040 408f40 VariantClear 88039->88040 88040->88041 88041->87037 88547 408d90 88042->88547 88044 429778 88045 410c60 VariantClear 88044->88045 88046 429780 88045->88046 88047 408cf9 88047->88044 88048 42976c 88047->88048 88050 408d2d 88047->88050 88572 45e737 90 API calls 3 library calls 88048->88572 88563 403d10 88050->88563 88053 408d71 moneypunct 88053->87037 88054 408d45 moneypunct 88054->88053 88055 408f40 VariantClear 88054->88055 88055->88054 88057 425c87 88056->88057 88058 40d15f 88056->88058 88059 425cc7 88057->88059 88060 425ca1 TranslateAcceleratorW 88057->88060 88058->87037 88060->88058 88062 42602f 88061->88062 88063 40d17f 88061->88063 88062->87037 88064 40d18c 88063->88064 88065 42608e IsDialogMessageW 88063->88065 88786 430c46 GetClassLongW 88063->88786 88064->87037 88065->88063 88065->88064 88068 4096c6 _wcslen 88067->88068 88069 40a70c moneypunct _memmove 88068->88069 88070 4115d7 52 API calls 88068->88070 88073 4013a0 52 API calls 88069->88073 88071 4096fa _memmove 88070->88071 88072 4115d7 52 API calls 88071->88072 88074 40971b 88072->88074 88075 4297aa 88073->88075 88074->88069 88076 409749 CharUpperBuffW 88074->88076 88082 40976a moneypunct 88074->88082 88077 4115d7 52 API calls 88075->88077 88076->88082 88078 4297d1 _memmove 88077->88078 88811 45e737 90 API calls 3 library calls 88078->88811 88081 42a452 88083 408f40 VariantClear 88081->88083 88127 4097e5 moneypunct 88082->88127 88788 47dcbb 201 API calls 88082->88788 88084 42ae92 88083->88084 88085 410c60 VariantClear 88084->88085 88086 42aea4 88085->88086 88087 409aa2 88087->88078 88089 4115d7 52 API calls 88087->88089 88093 409afe 88087->88093 88088 40a689 88090 4115d7 52 API calls 88088->88090 88089->88093 88111 40a6af moneypunct _memmove 88090->88111 88091 409b2a 88095 429dbe 88091->88095 88159 409b4d moneypunct _memmove 88091->88159 88794 40b400 VariantClear VariantClear moneypunct 88091->88794 88092 40c2c0 52 API calls 88092->88127 88093->88091 88094 4115d7 52 API calls 88093->88094 88096 429d31 88094->88096 88097 429dd3 88095->88097 88795 40b400 VariantClear VariantClear moneypunct 88095->88795 88101 429d42 88096->88101 88791 44a801 52 API calls 88096->88791 88117 40e1c0 VariantClear 88097->88117 88097->88159 88098 429a46 VariantClear 88098->88127 88099 409fd2 88102 40a045 88099->88102 88153 42a3f5 88099->88153 88109 40e0a0 52 API calls 88101->88109 88106 4115d7 52 API calls 88102->88106 88103 408f40 VariantClear 88103->88127 88113 40a04c 88106->88113 88108 4115d7 52 API calls 88108->88127 88114 429d57 88109->88114 88118 4115d7 52 API calls 88111->88118 88119 40a0a7 88113->88119 88122 4091e0 316 API calls 88113->88122 88792 453443 52 API calls 88114->88792 88115 40ba10 52 API calls 88115->88127 88116 42a42f 88799 45e737 90 API calls 3 library calls 88116->88799 88117->88159 88118->88069 88138 40a0af 88119->88138 88800 40c790 VariantClear moneypunct 88119->88800 88120 4299d9 88123 408f40 VariantClear 88120->88123 88122->88119 88126 4299e2 88123->88126 88124 429abd 88124->87037 88125 429d88 88793 453443 52 API calls 88125->88793 88135 410c60 VariantClear 88126->88135 88127->88078 88127->88081 88127->88087 88127->88088 88127->88092 88127->88098 88127->88103 88127->88108 88127->88111 88127->88115 88127->88120 88127->88124 88132 40a780 199 API calls 88127->88132 88789 40c4e0 199 API calls 88127->88789 88790 40e270 VariantClear moneypunct 88127->88790 88132->88127 88134 44a801 52 API calls 88134->88159 88190 40a650 moneypunct 88135->88190 88136 408f40 VariantClear 88168 40a162 moneypunct _memmove 88136->88168 88137 402780 52 API calls 88137->88159 88139 40a11b 88138->88139 88140 42a4b4 VariantClear 88138->88140 88138->88168 88146 40a12d moneypunct 88139->88146 88801 40e270 VariantClear moneypunct 88139->88801 88140->88146 88141 40a780 199 API calls 88141->88159 88142 408e80 VariantClear 88142->88159 88144 401980 53 API calls 88144->88159 88145 4115d7 52 API calls 88145->88168 88146->88145 88146->88168 88148 408e80 VariantClear 88148->88168 88149 42a74d VariantClear 88149->88168 88150 41130a 51 API calls __cinit 88150->88159 88151 4115d7 52 API calls 88151->88159 88152 40a368 88154 42aad4 88152->88154 88162 40a397 88152->88162 88798 47390f VariantClear 88153->88798 88804 46fe90 VariantClear VariantClear moneypunct 88154->88804 88155 42a886 VariantClear 88155->88168 88156 42a7e4 VariantClear 88156->88168 88158 409c95 88158->87037 88159->88069 88159->88099 88159->88116 88159->88134 88159->88137 88159->88141 88159->88142 88159->88144 88159->88150 88159->88151 88159->88153 88159->88158 88796 45f508 52 API calls 88159->88796 88797 403e10 53 API calls 88159->88797 88160 40a3ce 88172 40a3d9 moneypunct 88160->88172 88805 40b400 VariantClear VariantClear moneypunct 88160->88805 88161 40e270 VariantClear 88161->88168 88162->88160 88187 40a42c moneypunct 88162->88187 88787 40b400 VariantClear VariantClear moneypunct 88162->88787 88165 4115d7 52 API calls 88165->88168 88166 42abaf 88170 42abd4 VariantClear 88166->88170 88178 40a4ee moneypunct 88166->88178 88167 4115d7 52 API calls 88171 42a5a6 VariantInit VariantCopy 88167->88171 88168->88136 88168->88148 88168->88149 88168->88152 88168->88154 88168->88155 88168->88156 88168->88161 88168->88165 88168->88167 88802 470870 52 API calls 88168->88802 88803 44ccf1 VariantClear moneypunct 88168->88803 88169 40a4dc 88169->88178 88807 40e270 VariantClear moneypunct 88169->88807 88170->88178 88171->88168 88174 42a5c6 VariantClear 88171->88174 88173 40a41a 88172->88173 88180 42ab44 VariantClear 88172->88180 88172->88187 88173->88187 88806 40e270 VariantClear moneypunct 88173->88806 88174->88168 88175 42ac4f 88181 42ac79 VariantClear 88175->88181 88185 40a546 moneypunct 88175->88185 88178->88175 88179 40a534 88178->88179 88179->88185 88808 40e270 VariantClear moneypunct 88179->88808 88180->88187 88181->88185 88182 42ad28 88188 42ad4e VariantClear 88182->88188 88193 40a583 moneypunct 88182->88193 88185->88182 88186 40a571 88185->88186 88186->88193 88809 40e270 VariantClear moneypunct 88186->88809 88187->88166 88187->88169 88188->88193 88190->87037 88191 42ae0e VariantClear 88191->88193 88193->88190 88193->88191 88810 40e270 VariantClear moneypunct 88193->88810 88194->87037 88195->86986 88196->86991 88197->87037 88198->87037 88199->87037 88200->87037 88201->87042 88202->87042 88203->87042 88204->87042 88205->87042 88206->87042 88207->87042 88209 403cdf 88208->88209 88210 408f40 VariantClear 88209->88210 88211 403ce7 88210->88211 88211->87031 88212->87042 88213->87042 88214->87037 88215->86983 88217 408e94 88216->88217 88218 408e88 88216->88218 88220 45340c 88217->88220 88219 408f40 VariantClear 88218->88219 88219->88217 88221 453439 88220->88221 88222 453419 88220->88222 88221->87940 88223 45342f 88222->88223 88286 4531b1 85 API calls 5 library calls 88222->88286 88223->87940 88225 453425 88225->87940 88226->87946 88227->87948 88228->87931 88230 428372 88229->88230 88231 410c73 moneypunct 88229->88231 88233 42838c 88230->88233 88287 40e1c0 88230->88287 88231->87939 88235 40ba49 88234->88235 88236 40ba1b moneypunct _memmove 88234->88236 88238 4115d7 52 API calls 88235->88238 88237 4115d7 52 API calls 88236->88237 88239 40ba22 88237->88239 88238->88236 88239->87960 88240->87957 88241->87972 88242->87968 88244 40a7a6 88243->88244 88245 40ae8c 88243->88245 88286->88225 88288 408f40 VariantClear 88287->88288 88289 40e1cb moneypunct 88288->88289 88289->88230 88299->87985 88300->87989 88301->88003 88302->88006 88303->87993 88305 408e80 VariantClear 88304->88305 88307 47fb02 88305->88307 88309 47fc59 88307->88309 88311 47fc2b 88307->88311 88327 47fcd4 88307->88327 88330 408e80 VariantClear 88307->88330 88336 408f40 VariantClear 88307->88336 88346 47fc1d 88307->88346 88361 475a67 88307->88361 88389 47b291 88307->88389 88400 46fe32 VariantClear 88307->88400 88310 40a780 199 API calls 88309->88310 88314 47fc6a 88310->88314 88313 408f40 VariantClear 88311->88313 88315 47fc33 88313->88315 88314->88311 88317 47fc7d 88314->88317 88318 47fc8c 88314->88318 88316 408f40 VariantClear 88315->88316 88320 47fc3b 88316->88320 88402 45e737 90 API calls 3 library calls 88317->88402 88319 40ba10 52 API calls 88318->88319 88322 47fc98 88319->88322 88323 408f40 VariantClear 88320->88323 88403 47b2f4 144 API calls 88322->88403 88325 47fc43 88323->88325 88328 410c60 VariantClear 88325->88328 88326 47fca7 88329 408f40 VariantClear 88326->88329 88332 408f40 VariantClear 88327->88332 88331 47fc4b 88328->88331 88333 47fcb1 88329->88333 88330->88307 88331->88025 88334 47fcdc 88332->88334 88335 408f40 VariantClear 88333->88335 88337 408f40 VariantClear 88334->88337 88339 47fcb9 88335->88339 88336->88307 88338 47fce4 88337->88338 88340 408f40 VariantClear 88338->88340 88341 408f40 VariantClear 88339->88341 88342 47fcec 88340->88342 88343 47fcc1 88341->88343 88344 410c60 VariantClear 88342->88344 88345 410c60 VariantClear 88343->88345 88347 47fcf4 88344->88347 88348 47fcc9 88345->88348 88401 45e538 90 API calls 3 library calls 88346->88401 88347->88025 88348->88025 88350->88018 88351->88039 88352->88018 88353->88041 88354->88018 88355->88041 88356->88024 88357->88041 88358->88041 88359->88041 88360->88020 88362 475ae5 88361->88362 88365 475ac5 88361->88365 88404 45e737 90 API calls 3 library calls 88362->88404 88364 475afe 88366 408f40 VariantClear 88364->88366 88365->88362 88367 475b42 88365->88367 88368 402780 52 API calls 88365->88368 88371 475b06 88366->88371 88369 402780 52 API calls 88367->88369 88368->88365 88380 475b60 88369->88380 88370 475c7c 88372 408f40 VariantClear 88370->88372 88371->88307 88375 475c84 88372->88375 88373 40c2c0 52 API calls 88373->88380 88374 40a780 199 API calls 88374->88380 88375->88307 88376 475cc7 88377 408f40 VariantClear 88376->88377 88382 475ca8 88377->88382 88378 40ba10 52 API calls 88378->88380 88379 475cd5 88406 45e737 90 API calls 3 library calls 88379->88406 88380->88370 88380->88373 88380->88374 88380->88376 88380->88378 88380->88379 88381 408f40 VariantClear 88380->88381 88386 475ca0 88380->88386 88405 40c4e0 199 API calls 88380->88405 88381->88380 88382->88307 88385 475ce8 88387 408f40 VariantClear 88385->88387 88388 408f40 VariantClear 88386->88388 88387->88382 88388->88382 88390 47b2e7 88389->88390 88391 47b2a5 88389->88391 88390->88307 88407 40e710 88391->88407 88394 47b2b7 88418 47974b 88394->88418 88395 47b2cf 88396 47974b 144 API calls 88395->88396 88398 47b2df 88396->88398 88398->88307 88399 47b2c7 88399->88307 88400->88307 88401->88311 88402->88311 88403->88326 88404->88364 88405->88380 88406->88385 88408 408f40 VariantClear 88407->88408 88409 40e71b 88408->88409 88410 4115d7 52 API calls 88409->88410 88411 40e729 88410->88411 88412 40e734 88411->88412 88413 426bdc 88411->88413 88414 401b10 52 API calls 88412->88414 88417 426be7 88412->88417 88415 40bc70 52 API calls 88413->88415 88413->88417 88416 40e743 88414->88416 88415->88417 88416->88394 88416->88395 88419 479786 88418->88419 88420 479aed 88418->88420 88419->88420 88423 479798 88419->88423 88487 451b42 61 API calls 88420->88487 88422 479b00 88422->88399 88424 4797a2 88423->88424 88425 4797be 88423->88425 88480 451b42 61 API calls 88424->88480 88426 4797c7 88425->88426 88427 4797e3 88425->88427 88481 451b42 61 API calls 88426->88481 88458 441eba 88427->88458 88431 4797b5 88431->88399 88432 4797da 88432->88399 88433 4797f7 88434 479815 88433->88434 88435 4797fe 88433->88435 88439 47983c 88434->88439 88463 451d2b 88434->88463 88482 451b42 61 API calls 88435->88482 88437 47980c 88437->88399 88443 4798e6 88439->88443 88474 479714 88439->88474 88440 47994b VariantInit 88443->88440 88444 479916 VariantClear 88443->88444 88444->88443 88459 441f12 88458->88459 88460 441ecc _wcslen 88458->88460 88459->88433 88460->88459 88461 410160 52 API calls 88460->88461 88462 441ede 88461->88462 88462->88433 88464 451d5e 88463->88464 88465 451d68 88464->88465 88466 451e93 SysFreeString 88464->88466 88467 451f21 88464->88467 88468 451ea0 88464->88468 88465->88439 88466->88468 88467->88468 88469 451f6d lstrcmpiW 88467->88469 88470 451f7f SysFreeString 88467->88470 88473 451fab 88467->88473 88468->88465 88488 44a545 RaiseException 88468->88488 88469->88470 88470->88467 88473->88439 88475 479728 88474->88475 88480->88431 88481->88432 88482->88437 88487->88422 88488->88468 88548 4289d2 88547->88548 88549 408db3 88547->88549 88577 45e737 90 API calls 3 library calls 88548->88577 88573 40bec0 88549->88573 88552 4289e5 88578 45e737 90 API calls 3 library calls 88552->88578 88553 408e5a 88553->88047 88555 428a05 88557 408f40 VariantClear 88555->88557 88556 40ba10 52 API calls 88559 408dc9 88556->88559 88557->88553 88558 40a780 199 API calls 88558->88559 88559->88552 88559->88553 88559->88555 88559->88556 88559->88558 88560 408e64 88559->88560 88562 408f40 VariantClear 88559->88562 88561 408f40 VariantClear 88560->88561 88561->88553 88562->88559 88564 408f40 VariantClear 88563->88564 88565 403d20 88564->88565 88566 403cd0 VariantClear 88565->88566 88567 403d4d 88566->88567 88580 46f8cb 88567->88580 88599 477145 88567->88599 88604 4755ad 88567->88604 88568 403d76 88568->88044 88568->88054 88572->88044 88574 40bed0 88573->88574 88575 40bef2 88574->88575 88579 45e737 90 API calls 3 library calls 88574->88579 88575->88559 88577->88552 88578->88555 88579->88575 88581 46f8e7 88580->88581 88582 46f978 88580->88582 88583 46f900 88581->88583 88584 46f93c 88581->88584 88585 46f91a 88581->88585 88586 46f8ee 88581->88586 88582->88568 88587 45340c 85 API calls 88583->88587 88589 45340c 85 API calls 88584->88589 88588 45340c 85 API calls 88585->88588 88590 45340c 85 API calls 88586->88590 88587->88586 88591 46f931 88588->88591 88592 46f958 88589->88592 88593 46f971 88590->88593 88594 45340c 85 API calls 88591->88594 88595 45340c 85 API calls 88592->88595 88607 46cb5f 88593->88607 88594->88586 88597 46f95f 88595->88597 88598 45340c 85 API calls 88597->88598 88598->88586 88600 408e80 VariantClear 88599->88600 88601 47715a 88600->88601 88657 467ac4 88601->88657 88603 477160 88603->88568 88680 475077 88604->88680 88606 4755c0 88606->88568 88608 40bc70 52 API calls 88607->88608 88609 46cb7e 88608->88609 88610 40bc70 52 API calls 88609->88610 88611 46cb86 88610->88611 88612 40bc70 52 API calls 88611->88612 88613 46cb91 88612->88613 88614 408f40 VariantClear 88613->88614 88615 46cbaf 88614->88615 88616 46cbd4 CLSIDFromProgID 88615->88616 88617 46cbc5 OleInitialize 88615->88617 88617->88616 88658 467adc 88657->88658 88669 467bb8 88657->88669 88659 467c1d 88658->88659 88660 467c16 88658->88660 88661 467b90 88658->88661 88671 467aed 88658->88671 88662 4115d7 52 API calls 88659->88662 88679 40e270 VariantClear moneypunct 88660->88679 88664 4115d7 52 API calls 88661->88664 88665 467b75 _memmove 88662->88665 88664->88665 88667 4115d7 52 API calls 88665->88667 88666 467b55 88668 4115d7 52 API calls 88666->88668 88667->88669 88670 467b5b 88668->88670 88669->88603 88677 442ee0 52 API calls 88670->88677 88673 4115d7 52 API calls 88671->88673 88675 467b28 moneypunct 88671->88675 88673->88675 88674 467b6b 88678 45f645 54 API calls moneypunct 88674->88678 88675->88659 88675->88665 88675->88666 88677->88674 88678->88665 88679->88659 88733 4533eb 88680->88733 88683 4750ee 88686 408f40 VariantClear 88683->88686 88684 475129 88737 4646e0 88684->88737 88691 4750f5 88686->88691 88687 47515e 88688 475162 88687->88688 88726 47518e 88687->88726 88689 408f40 VariantClear 88688->88689 88690 475357 88691->88606 88699 4533eb 85 API calls 88699->88726 88708 475480 88718 4754b5 88726->88690 88726->88699 88726->88708 88726->88718 88726->88726 88734 453404 88733->88734 88735 4533f8 88733->88735 88734->88683 88734->88684 88735->88734 88780 4531b1 85 API calls 5 library calls 88735->88780 88781 4536f7 53 API calls 88737->88781 88739 4646fc 88782 4426cd 59 API calls _wcslen 88739->88782 88741 464711 88743 40bc70 52 API calls 88741->88743 88749 46474b 88741->88749 88744 46472c 88743->88744 88783 461465 52 API calls _memmove 88744->88783 88746 464741 88747 40c600 52 API calls 88746->88747 88747->88749 88748 464793 88748->88687 88749->88748 88784 463ad5 64 API calls __wcsicoll 88749->88784 88780->88734 88781->88739 88782->88741 88783->88746 88784->88748 88786->88063 88787->88160 88788->88082 88789->88127 88790->88127 88791->88101 88792->88125 88793->88091 88794->88095 88795->88097 88796->88159 88797->88159 88798->88116 88799->88081 88800->88119 88801->88146 88802->88168 88803->88168 88804->88160 88805->88172 88806->88187 88807->88178 88808->88185 88809->88193 88810->88193 88811->88081 88812 42d154 88816 480a8d 88812->88816 88814 42d161 88815 480a8d 199 API calls 88814->88815 88815->88814 88817 480ae4 88816->88817 88818 480b26 88816->88818 88819 480aeb 88817->88819 88820 480b15 88817->88820 88821 40bc70 52 API calls 88818->88821 88822 480aee 88819->88822 88823 480b04 88819->88823 88849 4805bf 199 API calls 88820->88849 88845 480b2e 88821->88845 88822->88818 88825 480af3 88822->88825 88848 47fea2 199 API calls __itow_s 88823->88848 88847 47f135 199 API calls 88825->88847 88828 40e0a0 52 API calls 88828->88845 88830 408f40 VariantClear 88832 481156 88830->88832 88831 480aff 88831->88830 88833 408f40 VariantClear 88832->88833 88834 48115e 88833->88834 88834->88814 88835 480ff5 88855 45e737 90 API calls 3 library calls 88835->88855 88836 40e710 53 API calls 88836->88845 88837 401980 53 API calls 88837->88845 88839 40c2c0 52 API calls 88839->88845 88840 40a780 199 API calls 88840->88845 88842 408e80 VariantClear 88842->88845 88845->88828 88845->88831 88845->88835 88845->88836 88845->88837 88845->88839 88845->88840 88845->88842 88850 45377f 52 API calls 88845->88850 88851 45e951 53 API calls 88845->88851 88852 40e830 53 API calls 88845->88852 88853 47925f 53 API calls 88845->88853 88854 47fcff 199 API calls 88845->88854 88847->88831 88848->88831 88849->88831 88850->88845 88851->88845 88852->88845 88853->88845 88854->88845 88855->88831 88856 428905 88857 4115d7 52 API calls 88856->88857 88858 42890c 88857->88858 88859 428945 88858->88859 88860 42891f 88858->88860 88861 4115d7 52 API calls 88859->88861 88862 4115d7 52 API calls 88860->88862 88863 42894c 88861->88863 88864 428925 _memmove 88862->88864 88865 42b14b 88872 40bc10 88865->88872 88867 42b159 88868 4096a0 330 API calls 88867->88868 88869 42b177 88868->88869 88883 44b92d VariantClear 88869->88883 88871 42bc5b 88873 40bc24 88872->88873 88874 40bc17 88872->88874 88876 40bc2a 88873->88876 88877 40bc3c 88873->88877 88875 408e80 VariantClear 88874->88875 88879 40bc1f 88875->88879 88880 408e80 VariantClear 88876->88880 88878 4115d7 52 API calls 88877->88878 88882 40bc43 88878->88882 88879->88867 88881 40bc33 88880->88881 88881->88867 88882->88867 88883->88871 88884 425b2b 88889 40f000 88884->88889 88888 425b3a 88890 4115d7 52 API calls 88889->88890 88891 40f007 88890->88891 88892 4276ea 88891->88892 88898 40f030 88891->88898 88897 41130a 51 API calls __cinit 88897->88888 88899 40f039 88898->88899 88900 40f01a 88898->88900 88928 41130a 51 API calls __cinit 88899->88928 88902 40e500 88900->88902 88903 40bc70 52 API calls 88902->88903 88904 40e515 GetVersionExW 88903->88904 88905 402160 52 API calls 88904->88905 88906 40e557 88905->88906 88929 40e660 88906->88929 88913 427674 88916 4276c6 GetSystemInfo 88913->88916 88914 40e5e0 88918 4276d5 GetSystemInfo 88914->88918 88943 40efd0 88914->88943 88915 40e5cd GetCurrentProcess 88950 40ef20 LoadLibraryA GetProcAddress 88915->88950 88916->88918 88921 40e629 88947 40ef90 88921->88947 88924 40e641 FreeLibrary 88925 40e644 88924->88925 88926 40e653 FreeLibrary 88925->88926 88927 40e656 88925->88927 88926->88927 88927->88897 88928->88900 88930 40e667 88929->88930 88931 42761d 88930->88931 88932 40c600 52 API calls 88930->88932 88933 40e55c 88932->88933 88934 40e680 88933->88934 88935 40e687 88934->88935 88936 427616 88935->88936 88937 40c600 52 API calls 88935->88937 88938 40e566 88937->88938 88938->88913 88939 40ef60 88938->88939 88940 40e5c8 88939->88940 88941 40ef66 LoadLibraryA 88939->88941 88940->88914 88940->88915 88941->88940 88942 40ef77 GetProcAddress 88941->88942 88942->88940 88944 40e620 88943->88944 88945 40efd6 LoadLibraryA 88943->88945 88944->88916 88944->88921 88945->88944 88946 40efe7 GetProcAddress 88945->88946 88946->88944 88951 40efb0 LoadLibraryA GetProcAddress 88947->88951 88949 40e632 GetNativeSystemInfo 88949->88924 88949->88925 88950->88914 88951->88949 88952 425b5e 88957 40c7f0 88952->88957 88956 425b6d 88992 40db10 52 API calls 88957->88992 88959 40c82a 88993 410ab0 6 API calls 88959->88993 88961 40c86d 88962 40bc70 52 API calls 88961->88962 88963 40c877 88962->88963 88964 40bc70 52 API calls 88963->88964 88965 40c881 88964->88965 88966 40bc70 52 API calls 88965->88966 88967 40c88b 88966->88967 88968 40bc70 52 API calls 88967->88968 88969 40c8d1 88968->88969 88970 40bc70 52 API calls 88969->88970 88971 40c991 88970->88971 88994 40d2c0 52 API calls 88971->88994 88973 40c99b 88995 40d0d0 53 API calls 88973->88995 88975 40c9c1 88976 40bc70 52 API calls 88975->88976 88977 40c9cb 88976->88977 88996 40e310 53 API calls 88977->88996 88979 40ca28 88980 408f40 VariantClear 88979->88980 88981 40ca30 88980->88981 88982 408f40 VariantClear 88981->88982 88983 40ca38 GetStdHandle 88982->88983 88984 429630 88983->88984 88985 40ca87 88983->88985 88984->88985 88986 429639 88984->88986 88991 41130a 51 API calls __cinit 88985->88991 88997 4432c0 57 API calls 88986->88997 88988 429641 88998 44b6ab CreateThread 88988->88998 88990 42964f CloseHandle 88990->88985 88991->88956 88992->88959 88993->88961 88994->88973 88995->88975 88996->88979 88997->88988 88998->88990 88999 44b5cb 58 API calls 88998->88999 89000 425b6f 89005 40dc90 89000->89005 89004 425b7e 89006 40bc70 52 API calls 89005->89006 89007 40dd03 89006->89007 89013 40f210 89007->89013 89010 40dd96 89011 40ddb7 89010->89011 89016 40dc00 52 API calls 2 library calls 89010->89016 89012 41130a 51 API calls __cinit 89011->89012 89012->89004 89017 40f250 RegOpenKeyExW 89013->89017 89015 40f230 89015->89010 89016->89010 89018 425e17 89017->89018 89019 40f275 RegQueryValueExW 89017->89019 89018->89015 89020 40f2c3 RegCloseKey 89019->89020 89021 40f298 89019->89021 89020->89015 89022 40f2a9 RegCloseKey 89021->89022 89023 425e1d 89021->89023 89022->89015
      APIs
      • _wcslen.LIBCMT ref: 004096C1
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _memmove.LIBCMT ref: 0040970C
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
      • _memmove.LIBCMT ref: 00409D96
      • _memmove.LIBCMT ref: 0040A6C4
      • _memmove.LIBCMT ref: 004297E5
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
      • String ID:
      • API String ID: 2383988440-0
      • Opcode ID: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
      • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
      • Opcode Fuzzy Hash: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
      • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

      Control-flow Graph

      APIs
      • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
        • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,00000104,?), ref: 00401F4C
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
        • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
      • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
      • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
        • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
      • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
      • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
      • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
      • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
      • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
        • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
        • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
        • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
        • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
        • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
        • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
      • String ID: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
      • API String ID: 2495805114-2654659288
      • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
      • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
      • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
      • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1533 46cc96-46cca1 1528->1533 1539 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1539 1529->1533 1534 46cc62-46cc8b call 43119b 1529->1534 1531 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1531 1533->1531 1548 46cc8e-46cc90 1534->1548 1553 46cdf4 1539->1553 1554 46ccfd-46cd1f call 402160 call 431a2b 1539->1554 1548->1533 1551 46ceb7-46cef0 call 468070 call 402250 * 3 1548->1551 1555 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1553->1555 1567 46cd35-46cd47 call 465177 1554->1567 1568 46cd21-46cd33 1554->1568 1555->1533 1565 46ce50-46ce55 1555->1565 1565->1533 1570 46ce5b-46ce62 1565->1570 1583 46cd4a-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1567->1583 1571 46cda5-46cdaa 1568->1571 1574 46ce64-46ce8b CoSetProxyBlanket 1570->1574 1575 46ce8d-46ce9e 1570->1575 1579 46cdac-46cdbb call 4111c1 1571->1579 1580 46cdbd-46cdc0 1571->1580 1574->1575 1575->1548 1578 46cea4-46ceb2 1575->1578 1578->1531 1582 46cdc3-46cdf2 1579->1582 1580->1582 1582->1555 1583->1571
      APIs
      • OleInitialize.OLE32(00000000), ref: 0046CBC7
      • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
      • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
      • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
      • _wcslen.LIBCMT ref: 0046CDB0
      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
      • CoTaskMemFree.OLE32(?), ref: 0046CE42
      • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
        • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
        • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
        • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
      Strings
      • NULL Pointer assignment, xrefs: 0046CEA6
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
      • String ID: NULL Pointer assignment
      • API String ID: 440038798-2785691316
      • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
      • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
      • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
      • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1997 40e585-40e596 1995->1997 1998 40e5ba-40e5cb call 40ef60 1995->1998 1999 427683-427686 1996->1999 2000 42767b-427681 1996->2000 2002 427625-427629 1997->2002 2003 40e59c-40e59f 1997->2003 2017 40e5ec-40e60c 1998->2017 2018 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1998->2018 2004 427693-427696 1999->2004 2005 427688-427691 1999->2005 2001 4276b4-4276be 2000->2001 2019 4276c6-4276ca GetSystemInfo 2001->2019 2011 427636-427640 2002->2011 2012 42762b-427631 2002->2012 2007 40e5a5-40e5ae 2003->2007 2008 427654-427657 2003->2008 2004->2001 2009 427698-4276a8 2004->2009 2005->2001 2013 40e5b4 2007->2013 2014 427645-42764f 2007->2014 2008->1998 2020 42765d-42766f 2008->2020 2015 4276b0 2009->2015 2016 4276aa-4276ae 2009->2016 2011->1998 2012->1998 2013->1998 2014->1998 2015->2001 2016->2001 2022 40e612-40e623 call 40efd0 2017->2022 2023 4276d5-4276df GetSystemInfo 2017->2023 2018->2017 2030 40e5e8 2018->2030 2019->2023 2020->1998 2022->2019 2027 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2027 2032 40e641-40e642 FreeLibrary 2027->2032 2033 40e644-40e651 2027->2033 2030->2017 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
      APIs
      • GetVersionExW.KERNEL32(?), ref: 0040E52A
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
      • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
      • FreeLibrary.KERNEL32(?), ref: 0040E642
      • FreeLibrary.KERNEL32(?), ref: 0040E654
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
      • String ID: 0SH
      • API String ID: 3363477735-851180471
      • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
      • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
      • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
      • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
      APIs
      • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: IsThemeActive$uxtheme.dll
      • API String ID: 2574300362-3542929980
      • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
      • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
      • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
      • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
      APIs
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
      • Sleep.KERNEL32(0000000A,?), ref: 004094D1
      • TranslateMessage.USER32(?), ref: 00409556
      • DispatchMessageW.USER32(?), ref: 00409561
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Message$Peek$DispatchSleepTranslate
      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
      • API String ID: 1762048999-758534266
      • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
      • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
      • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
      • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

      Control-flow Graph

      APIs
      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,00000104,?), ref: 00401F4C
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • __wcsicoll.LIBCMT ref: 00402007
      • __wcsicoll.LIBCMT ref: 0040201D
      • __wcsicoll.LIBCMT ref: 00402033
        • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
      • __wcsicoll.LIBCMT ref: 00402049
      • _wcscpy.LIBCMT ref: 0040207C
      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,00000104), ref: 00428B5B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe$CMDLINE$CMDLINERAW
      • API String ID: 3948761352-2198324815
      • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
      • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
      • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
      • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __fread_nolock$_fseek_wcscpy
      • String ID: D)E$D)E$FILE
      • API String ID: 3888824918-361185794
      • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
      • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
      • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
      • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

      Control-flow Graph

      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
      • __wsplitpath.LIBCMT ref: 0040E41C
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcsncat.LIBCMT ref: 0040E433
      • __wmakepath.LIBCMT ref: 0040E44F
        • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • _wcscpy.LIBCMT ref: 0040E487
        • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
      • _wcscat.LIBCMT ref: 00427541
      • _wcslen.LIBCMT ref: 00427551
      • _wcslen.LIBCMT ref: 00427562
      • _wcscat.LIBCMT ref: 0042757C
      • _wcsncpy.LIBCMT ref: 004275BC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
      • String ID: Include$\
      • API String ID: 3173733714-3429789819
      • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
      • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
      • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
      • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

      Control-flow Graph

      APIs
      • _fseek.LIBCMT ref: 0045292B
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
      • __fread_nolock.LIBCMT ref: 00452961
      • __fread_nolock.LIBCMT ref: 00452971
      • __fread_nolock.LIBCMT ref: 0045298A
      • __fread_nolock.LIBCMT ref: 004529A5
      • _fseek.LIBCMT ref: 004529BF
      • _malloc.LIBCMT ref: 004529CA
      • _malloc.LIBCMT ref: 004529D6
      • __fread_nolock.LIBCMT ref: 004529E7
      • _free.LIBCMT ref: 00452A17
      • _free.LIBCMT ref: 00452A20
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
      • String ID:
      • API String ID: 1255752989-0
      • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
      • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
      • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
      • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

      Control-flow Graph

      APIs
      • GetSysColorBrush.USER32(0000000F), ref: 004104C3
      • RegisterClassExW.USER32(00000030), ref: 004104ED
      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
      • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
      • LoadIconW.USER32(00400000,000000A9), ref: 00410542
      • ImageList_ReplaceIcon.COMCTL32(00ADF630,000000FF,00000000), ref: 00410552
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
      • API String ID: 2914291525-1005189915
      • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
      • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
      • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
      • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

      Control-flow Graph

      APIs
      • GetSysColorBrush.USER32(0000000F), ref: 0041039B
      • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
      • LoadIconW.USER32(?,00000063), ref: 004103C0
      • LoadIconW.USER32(?,000000A4), ref: 004103D3
      • LoadIconW.USER32(?,000000A2), ref: 004103E6
      • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
      • RegisterClassExW.USER32(?), ref: 0041045D
        • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
        • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
        • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
        • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
        • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
        • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
        • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00ADF630,000000FF,00000000), ref: 00410552
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
      • String ID: #$0$AutoIt v3
      • API String ID: 423443420-4155596026
      • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
      • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
      • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
      • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _malloc
      • String ID: Default
      • API String ID: 1579825452-753088835
      • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
      • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
      • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
      • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2056 40f679-40f67c 2051->2056 2053 40f640 2052->2053 2055 40f642-40f650 2053->2055 2057 40f652-40f655 2055->2057 2058 40f67e-40f68c 2055->2058 2056->2045 2059 40f65b-40f65e 2057->2059 2060 425d1e-425d3e call 4150d1 call 414d04 2057->2060 2061 40f68e-40f68f 2058->2061 2062 40f69f-40f6ad 2058->2062 2059->2051 2059->2053 2073 425d43-425d5f call 414d30 2060->2073 2061->2057 2063 40f6b4-40f6c2 2062->2063 2064 40f6af-40f6b2 2062->2064 2066 425d16 2063->2066 2067 40f6c8-40f6d6 2063->2067 2064->2057 2066->2060 2069 425d05-425d0b 2067->2069 2070 40f6dc-40f6df 2067->2070 2069->2055 2072 425d11 2069->2072 2070->2057 2072->2066 2073->2050
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __fread_nolock_fseek_memmove_strcat
      • String ID: AU3!$EA06
      • API String ID: 1268643489-2658333250
      • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
      • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
      • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
      • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2080 401144-40114a 2077->2080 2081 40111b-40111e 2077->2081 2078->2077 2079 401182 2078->2079 2082 40112c-401141 DefWindowProcW 2079->2082 2084 401184-40118e call 401250 2080->2084 2085 40114c-40114f 2080->2085 2081->2080 2083 401120-401126 2081->2083 2083->2082 2087 42b038-42b03f 2083->2087 2091 401193-40119a 2084->2091 2088 401151-401157 2085->2088 2089 40119d 2085->2089 2087->2082 2090 42b045-42b059 call 401000 call 40e0c0 2087->2090 2094 401219-40121f 2088->2094 2095 40115d 2088->2095 2092 4011a3-4011a9 2089->2092 2093 42afb4-42afc5 call 40f190 2089->2093 2090->2082 2092->2083 2098 4011af 2092->2098 2093->2091 2094->2083 2101 401225-42b06d call 468b0e 2094->2101 2099 401163-401166 2095->2099 2100 42b01d-42b024 2095->2100 2098->2083 2105 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2098->2105 2106 4011db-401202 SetTimer RegisterWindowMessageW 2098->2106 2108 42afe9-42b018 call 40f190 call 401a50 2099->2108 2109 40116c-401172 2099->2109 2100->2082 2107 42b02a-42b033 call 4370f4 2100->2107 2101->2091 2106->2091 2115 401204-401216 CreatePopupMenu 2106->2115 2107->2082 2108->2082 2109->2083 2110 401174-42afde call 45fd57 2109->2110 2110->2082 2127 42afe4 2110->2127 2127->2091
      APIs
      • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
      • KillTimer.USER32(?,00000001,?), ref: 004011B9
      • PostQuitMessage.USER32(00000000), ref: 004011CB
      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
      • CreatePopupMenu.USER32 ref: 00401204
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
      • String ID: TaskbarCreated
      • API String ID: 129472671-2362178303
      • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
      • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
      • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
      • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
      APIs
      • _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • std::exception::exception.LIBCMT ref: 00411626
      • std::exception::exception.LIBCMT ref: 00411640
      • __CxxThrowException@8.LIBCMT ref: 00411651
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
      • String ID: ,*H$4*H$@fI
      • API String ID: 615853336-1459471987
      • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
      • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
      • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
      • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2147 4384178-43841ca call 4384078 CreateFileW 2150 43841cc-43841ce 2147->2150 2151 43841d3-43841e0 2147->2151 2152 438432c-4384330 2150->2152 2154 43841e2-43841ee 2151->2154 2155 43841f3-438420a VirtualAlloc 2151->2155 2154->2152 2156 438420c-438420e 2155->2156 2157 4384213-4384239 CreateFileW 2155->2157 2156->2152 2159 438423b-4384258 2157->2159 2160 438425d-4384277 ReadFile 2157->2160 2159->2152 2161 4384279-4384296 2160->2161 2162 438429b-438429f 2160->2162 2161->2152 2163 43842c0-43842d7 WriteFile 2162->2163 2164 43842a1-43842be 2162->2164 2167 43842d9-4384300 2163->2167 2168 4384302-4384327 CloseHandle VirtualFree 2163->2168 2164->2152 2167->2152 2168->2152
      APIs
      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 043841BD
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateFile
      • String ID:
      • API String ID: 823142352-0
      • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
      • Instruction ID: be0fe7fe4dcc8a95eba285206e4212c1610f1ce32be3d863ed1f68df1a200201
      • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
      • Instruction Fuzzy Hash: C651FB75A50209FBEF20EFF4CC49FDEB778AF48701F108558F619EA180EA74A6449B60

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2177 4102b0-4102c5 SHGetMalloc 2178 4102cb-4102da SHGetDesktopFolder 2177->2178 2179 425dfd-425e0e call 433244 2177->2179 2180 4102e0-41031a call 412fba 2178->2180 2181 41036b-410379 2178->2181 2189 410360-410368 2180->2189 2190 41031c-410331 SHGetPathFromIDListW 2180->2190 2181->2179 2187 41037f-410384 2181->2187 2189->2181 2191 410351-41035d 2190->2191 2192 410333-41034a call 412fba 2190->2192 2191->2189 2192->2191
      APIs
      • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
      • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
      • _wcsncpy.LIBCMT ref: 004102ED
      • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
      • _wcsncpy.LIBCMT ref: 00410340
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcsncpy$DesktopFolderFromListMallocPath
      • String ID: C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
      • API String ID: 3170942423-1452949814
      • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
      • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
      • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
      • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2195 401250-40125c 2196 401262-401293 call 412f40 call 401b80 2195->2196 2197 4012e8-4012ed 2195->2197 2202 4012d1-4012e2 KillTimer SetTimer 2196->2202 2203 401295-4012b5 2196->2203 2202->2197 2204 4012bb-4012bf 2203->2204 2205 4272ec-4272f2 2203->2205 2206 4012c5-4012cb 2204->2206 2207 42733f-427346 2204->2207 2208 4272f4-427315 Shell_NotifyIconW 2205->2208 2209 42731a-42733a Shell_NotifyIconW 2205->2209 2206->2202 2212 427393-4273b4 Shell_NotifyIconW 2206->2212 2210 427348-427369 Shell_NotifyIconW 2207->2210 2211 42736e-42738e Shell_NotifyIconW 2207->2211 2208->2202 2209->2202 2210->2202 2211->2202 2212->2202
      APIs
        • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
        • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
        • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
      • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
      • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
      • String ID:
      • API String ID: 3300667738-0
      • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
      • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
      • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
      • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
      APIs
      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
      • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: QueryValue$CloseOpen
      • String ID: Include$Software\AutoIt v3\AutoIt
      • API String ID: 1586453840-614718249
      • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
      • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
      • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
      • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
      APIs
      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
      • ShowWindow.USER32(?,00000000), ref: 004105E4
      • ShowWindow.USER32(?,00000000), ref: 004105EE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$CreateShow
      • String ID: AutoIt v3$edit
      • API String ID: 1584632944-3779509399
      • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
      • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
      • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
      • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$Copy$ClearErrorLast
      • String ID: NULL Pointer assignment$Not an Object type
      • API String ID: 2487901850-572801152
      • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
      • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
      • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
      • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
      APIs
      • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcsncpy.LIBCMT ref: 00401C41
      • _wcscpy.LIBCMT ref: 00401C5D
      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
      • String ID: Line:
      • API String ID: 1874344091-1585850449
      • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
      • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
      • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
      • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
      APIs
      • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
      • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
      • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
      • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Close$OpenQueryValue
      • String ID: Control Panel\Mouse
      • API String ID: 1607946009-824357125
      • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
      • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
      • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
      • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
      APIs
        • Part of subcall function 04385AF8: Sleep.KERNELBASE(000001F4), ref: 04385B09
      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 04385D2A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateFileSleep
      • String ID: 3AX5C5JIYF9XS4
      • API String ID: 2694422964-3726936652
      • Opcode ID: 76d87b19abf73214cebf58d917c4b4e25cba0a2c622756fb50f732238b317af1
      • Instruction ID: aee7477dbe284d1563eb15d067e46899cff9f4669e81b198db24b9be7283427d
      • Opcode Fuzzy Hash: 76d87b19abf73214cebf58d917c4b4e25cba0a2c622756fb50f732238b317af1
      • Instruction Fuzzy Hash: 1E517131E04249EBEF11EBA4C855BEEBB79AF54300F00459DE608BB2C0D7795B49CBA5
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
      • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
      • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
      • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
      APIs
      • VariantInit.OLEAUT32(?), ref: 0047950F
      • SysAllocString.OLEAUT32(00000000), ref: 004795D8
      • VariantCopy.OLEAUT32(?,?), ref: 0047960F
      • VariantClear.OLEAUT32(?), ref: 00479650
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$AllocClearCopyInitString
      • String ID:
      • API String ID: 2808897238-0
      • Opcode ID: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
      • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
      • Opcode Fuzzy Hash: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
      • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
      APIs
        • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
      • _free.LIBCMT ref: 004295A0
        • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
        • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
        • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
        • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
        • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
        • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
      • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
      • API String ID: 3938964917-3163217153
      • Opcode ID: 0fadbe489cdcd46ec1bf963d65e031e9163368aa71c0f71e6d266d6ca212c12a
      • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
      • Opcode Fuzzy Hash: 0fadbe489cdcd46ec1bf963d65e031e9163368aa71c0f71e6d266d6ca212c12a
      • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: Error:
      • API String ID: 4104443479-232661952
      • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
      • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
      • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
      • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
      APIs
      • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,0040F545,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,004A90E8,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,?,0040F545), ref: 0041013C
        • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
        • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
        • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
        • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
      • String ID: X$pWH
      • API String ID: 85490731-941433119
      • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
      • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
      • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
      • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
      APIs
      • CreateProcessW.KERNELBASE(?,00000000), ref: 0438489D
      • ExitProcess.KERNEL32(00000000), ref: 043848BC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Process$CreateExit
      • String ID: D
      • API String ID: 126409537-2746444292
      • Opcode ID: 9ec10d9bb68332e7bcdb3756cd9d8bc900757a5150bae08cbb91c2426b35d2e1
      • Instruction ID: c276e69a91387274ce8ed81ebd7faa6d9693242bf2b77ef372d3f28fab4273b1
      • Opcode Fuzzy Hash: 9ec10d9bb68332e7bcdb3756cd9d8bc900757a5150bae08cbb91c2426b35d2e1
      • Instruction Fuzzy Hash: 3EF0F47254424CABDB60EFE0CC49FEEB77CBF04701F508508FB599A144DA74A5088751
      Strings
      • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
      • C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe, xrefs: 00410107
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _strcat
      • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
      • API String ID: 1765576173-1235420069
      • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
      • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
      • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
      • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
      • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
      • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
      • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __filbuf__getptd_noexit__read_memcpy_s
      • String ID:
      • API String ID: 1794320848-0
      • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
      • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
      • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
      • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
      APIs
      • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
      • TerminateProcess.KERNEL32(00000000), ref: 004753CE
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Process$CurrentTerminate
      • String ID:
      • API String ID: 2429186680-0
      • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
      • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
      • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
      • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
      APIs
      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: IconNotifyShell_
      • String ID:
      • API String ID: 1144537725-0
      • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
      • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
      • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
      • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
      APIs
      • _malloc.LIBCMT ref: 0043214B
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • _malloc.LIBCMT ref: 0043215D
      • _malloc.LIBCMT ref: 0043216F
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _malloc$AllocateHeap
      • String ID:
      • API String ID: 680241177-0
      • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
      • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
      • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
      • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
      APIs
      • TranslateMessage.USER32(?), ref: 00409556
      • DispatchMessageW.USER32(?), ref: 00409561
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Message$DispatchPeekTranslate
      • String ID:
      • API String ID: 4217535847-0
      • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
      • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
      • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
      • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
      • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
      • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
      • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
      • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
      • Opcode Fuzzy Hash: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
      • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
      APIs
        • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
      • _strcat.LIBCMT ref: 0040F786
        • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
        • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
      • String ID:
      • API String ID: 3199840319-0
      • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
      • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
      • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
      • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
      APIs
      • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0040D779
      • FreeLibrary.KERNEL32(?), ref: 0040D78E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: FreeInfoLibraryParametersSystem
      • String ID:
      • API String ID: 3403648963-0
      • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
      • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
      • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
      • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
      APIs
      • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 00473B8D
      • _memmove.LIBCMT ref: 00473BBD
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ArrayCreateSafeVector_memmove
      • String ID:
      • API String ID: 564309351-0
      • Opcode ID: 927860ad1d610d876ffb5b648d8578c5aeccaab6c37d476698ef8c4dfd3a4d25
      • Instruction ID: 457454d8b13899d86e5be62d6fbacd9c0d8eef3db234b15496ed66e70df05eda
      • Opcode Fuzzy Hash: 927860ad1d610d876ffb5b648d8578c5aeccaab6c37d476698ef8c4dfd3a4d25
      • Instruction Fuzzy Hash: AC018F7790011C66D600FA6AEC429EB776CDB80355F00057FFE05A6142EE39AA5982F9
      APIs
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      • __lock_file.LIBCMT ref: 00414A8D
        • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
      • __fclose_nolock.LIBCMT ref: 00414A98
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
      • String ID:
      • API String ID: 2800547568-0
      • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
      • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
      • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
      • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
      APIs
      • __lock_file.LIBCMT ref: 00415012
      • __ftell_nolock.LIBCMT ref: 0041501F
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __ftell_nolock__getptd_noexit__lock_file
      • String ID:
      • API String ID: 2999321469-0
      • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
      • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
      • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
      • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
      APIs
      • VariantClear.OLEAUT32(00479459), ref: 0043706B
      • VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$ClearCopy
      • String ID:
      • API String ID: 274517740-0
      • Opcode ID: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
      • Instruction ID: 04f5bc28fb39dc4d651aca37f2cae7a6fb773616424f01e3c31b72a906b86de5
      • Opcode Fuzzy Hash: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
      • Instruction Fuzzy Hash: 76C01236001128BB46016B99EC08CDF775CEE096617008011FD0483101C770A90087F9
      APIs
        • Part of subcall function 04384138: GetFileAttributesW.KERNELBASE(?), ref: 04384143
      • CreateDirectoryW.KERNELBASE(?,00000000), ref: 043849F7
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AttributesCreateDirectoryFile
      • String ID:
      • API String ID: 3401506121-0
      • Opcode ID: fef485108c8867a555c341ca00a06f0667b0adcde9fceacf1968bdbcc6e43f4b
      • Instruction ID: 1b8de345b3d97ac38ff62c0bc2d125abea86b212d8466e004eb534c7f4d8267e
      • Opcode Fuzzy Hash: fef485108c8867a555c341ca00a06f0667b0adcde9fceacf1968bdbcc6e43f4b
      • Instruction Fuzzy Hash: 89517635A1020996EF14FFA0D944BEFB379EF58300F0055ADA509EB184FB79AB44CBA5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
      • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
      • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
      • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ProtectVirtual
      • String ID:
      • API String ID: 544645111-0
      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
      • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
      • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
      • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
      • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
      • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __lock_file
      • String ID:
      • API String ID: 3031932315-0
      • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
      • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
      • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
      • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • _memmove.LIBCMT ref: 00428939
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
      • String ID:
      • API String ID: 620504543-0
      • Opcode ID: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
      • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
      • Opcode Fuzzy Hash: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
      • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
      APIs
        • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
        • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
        • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
      • VariantClear.OLEAUT32(?), ref: 0047973E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$Clear$CopyInit
      • String ID:
      • API String ID: 24293632-0
      • Opcode ID: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
      • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
      • Opcode Fuzzy Hash: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
      • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
      APIs
      • GetFileAttributesW.KERNELBASE(?), ref: 04384143
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
      • Instruction ID: 6a068d3b275b103b38431c365d1acb140bcc39b73db8667ba41fd9993f6d2802
      • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
      • Instruction Fuzzy Hash: 6AE0863060531DDBCB50EAA88D046AAB3A8A765310F008659A525C3A80F630E900D654
      APIs
      • GetFileAttributesW.KERNELBASE(?), ref: 04384113
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
      • Instruction ID: f2ab258f3c251144a1b05ad4180ef00e257c446d24002a0c028d0569aca70648
      • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
      • Instruction Fuzzy Hash: 63D0A73090531DEBCB10DFB49D049DDB7ACD715322F005759FD25C3680E531A9009750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wfsopen
      • String ID:
      • API String ID: 197181222-0
      • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
      • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
      • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
      • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: dd957122352b2a24994cc76c0a2fe1c6bdbe155a2543db358ff03b8863c1f765
      • Instruction ID: 4c453d13d2013f2e1e26a6480b89871b610256b9520be3dfcd5ee63b17ce12d0
      • Opcode Fuzzy Hash: dd957122352b2a24994cc76c0a2fe1c6bdbe155a2543db358ff03b8863c1f765
      • Instruction Fuzzy Hash: 52C09B714156204F5350DF7DF84C98777D4EF0D214341C97FD059C2510E6B458414F94
      APIs
      • Sleep.KERNELBASE(000001F4), ref: 04385B09
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Sleep
      • String ID:
      • API String ID: 3472027048-0
      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
      • Instruction ID: eb06faaed9bf215509ba261ddbfc0106df4f981e02bb19718414069152ef2646
      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
      • Instruction Fuzzy Hash: 45E0BF7494020DEFDB00EFB4D5496DD7BB4EF04311F1005A5FD05D7680DB309E548A62
      APIs
      • Sleep.KERNELBASE(000001F4), ref: 04385B09
      Memory Dump Source
      • Source File: 00000000.00000002.1509564496.0000000004383000.00000040.00000020.00020000.00000000.sdmp, Offset: 04383000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4383000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Sleep
      • String ID:
      • API String ID: 3472027048-0
      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
      • Instruction ID: 44debc2e4e94c10953b80546efb5df21488fd5726316b2206d1b239bca728838
      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
      • Instruction Fuzzy Hash: 22E0E67494020DEFDB00EFB4D54969D7BF4EF04301F100565FD01D2280D6309D508A72
      APIs
      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
      • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
      • GetKeyState.USER32(00000011), ref: 0047C92D
      • GetKeyState.USER32(00000009), ref: 0047C936
      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
      • GetKeyState.USER32(00000010), ref: 0047C953
      • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
      • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
      • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
      • _wcsncpy.LIBCMT ref: 0047CA29
      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
      • SendMessageW.USER32 ref: 0047CA7F
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
      • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
      • ImageList_SetDragCursorImage.COMCTL32(00ADF630,00000000,00000000,00000000), ref: 0047CB9B
      • ImageList_BeginDrag.COMCTL32(00ADF630,00000000,000000F8,000000F0), ref: 0047CBAC
      • SetCapture.USER32(?), ref: 0047CBB6
      • ClientToScreen.USER32(?,?), ref: 0047CC17
      • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
      • ReleaseCapture.USER32 ref: 0047CC3A
      • GetCursorPos.USER32(?), ref: 0047CC72
      • ScreenToClient.USER32(?,?), ref: 0047CC80
      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
      • SendMessageW.USER32 ref: 0047CD12
      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
      • SendMessageW.USER32 ref: 0047CD80
      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
      • GetCursorPos.USER32(?), ref: 0047CDC8
      • ScreenToClient.USER32(?,?), ref: 0047CDD6
      • GetParent.USER32(00000000), ref: 0047CDF7
      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
      • SendMessageW.USER32 ref: 0047CE93
      • ClientToScreen.USER32(?,?), ref: 0047CEEE
      • TrackPopupMenuEx.USER32(?,00000000,?,?,00951AD8,00000000,?,?,?,?), ref: 0047CF1C
      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
      • SendMessageW.USER32 ref: 0047CF6B
      • ClientToScreen.USER32(?,?), ref: 0047CFB5
      • TrackPopupMenuEx.USER32(?,00000080,?,?,00951AD8,00000000,?,?,?,?), ref: 0047CFE6
      • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
      • String ID: @GUI_DRAGID$F
      • API String ID: 3100379633-4164748364
      • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
      • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
      • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
      • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
      APIs
      • GetForegroundWindow.USER32 ref: 00434420
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
      • IsIconic.USER32(?), ref: 0043444F
      • ShowWindow.USER32(?,00000009), ref: 0043445C
      • SetForegroundWindow.USER32(?), ref: 0043446A
      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
      • GetCurrentThreadId.KERNEL32 ref: 00434485
      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
      • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
      • SetForegroundWindow.USER32(00000000), ref: 004344B7
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
      • keybd_event.USER32(00000012,00000000), ref: 004344CF
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
      • keybd_event.USER32(00000012,00000000), ref: 004344E6
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
      • keybd_event.USER32(00000012,00000000), ref: 004344FD
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
      • keybd_event.USER32(00000012,00000000), ref: 00434514
      • SetForegroundWindow.USER32(00000000), ref: 0043451E
      • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
      • String ID: Shell_TrayWnd
      • API String ID: 2889586943-2988720461
      • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
      • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
      • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
      • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
      APIs
      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
      • CloseHandle.KERNEL32(?), ref: 004463A0
      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
      • GetProcessWindowStation.USER32 ref: 004463D1
      • SetProcessWindowStation.USER32(00000000), ref: 004463DB
      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
      • _wcslen.LIBCMT ref: 00446498
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _wcsncpy.LIBCMT ref: 004464C0
      • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
      • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
      • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
      • UnloadUserProfile.USERENV(?,?), ref: 00446555
      • CloseWindowStation.USER32(00000000), ref: 0044656C
      • CloseDesktop.USER32(?), ref: 0044657A
      • SetProcessWindowStation.USER32(?), ref: 00446588
      • CloseHandle.KERNEL32(?), ref: 00446592
      • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
      • String ID: $@OH$default$winsta0
      • API String ID: 3324942560-3791954436
      • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
      • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
      • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
      • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,0040F545,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,004A90E8,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,?,0040F545), ref: 0041013C
        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
        • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • _wcscat.LIBCMT ref: 0044BD94
      • _wcscat.LIBCMT ref: 0044BDBD
      • __wsplitpath.LIBCMT ref: 0044BDEA
      • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
      • _wcscpy.LIBCMT ref: 0044BE71
      • _wcscat.LIBCMT ref: 0044BE83
      • _wcscat.LIBCMT ref: 0044BE95
      • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
      • DeleteFileW.KERNEL32(?), ref: 0044BED3
      • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
      • DeleteFileW.KERNEL32(?), ref: 0044BF15
      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
      • FindClose.KERNEL32(00000000), ref: 0044BF33
      • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
      • FindClose.KERNEL32(00000000), ref: 0044BF7C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
      • String ID: \*.*
      • API String ID: 2188072990-1173974218
      • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
      • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
      • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
      • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
      APIs
      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
      • FindClose.KERNEL32(00000000), ref: 00478924
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
      • __swprintf.LIBCMT ref: 004789D3
      • __swprintf.LIBCMT ref: 00478A1D
      • __swprintf.LIBCMT ref: 00478A4B
      • __swprintf.LIBCMT ref: 00478A79
        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
      • __swprintf.LIBCMT ref: 00478AA7
      • __swprintf.LIBCMT ref: 00478AD5
      • __swprintf.LIBCMT ref: 00478B03
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
      • API String ID: 999945258-2428617273
      • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
      • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
      • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
      • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
      • __wsplitpath.LIBCMT ref: 00403492
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcscpy.LIBCMT ref: 004034A7
      • _wcscat.LIBCMT ref: 004034BC
      • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
      • _wcscpy.LIBCMT ref: 004035A0
      • _wcslen.LIBCMT ref: 00403623
      • _wcslen.LIBCMT ref: 0040367D
      Strings
      • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
      • Error opening the file, xrefs: 00428231
      • _, xrefs: 0040371C
      • Unterminated string, xrefs: 00428348
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
      • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
      • API String ID: 3393021363-188983378
      • Opcode ID: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
      • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
      • Opcode Fuzzy Hash: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
      • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
      APIs
      • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
      • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
      • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
      • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
      • FindClose.KERNEL32(00000000), ref: 00431B20
      • FindClose.KERNEL32(00000000), ref: 00431B34
      • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
      • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
      • FindClose.KERNEL32(00000000), ref: 00431BCD
      • FindClose.KERNEL32(00000000), ref: 00431BDB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
      • String ID: *.*
      • API String ID: 1409584000-438819550
      • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
      • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
      • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
      • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
      APIs
      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
      • __swprintf.LIBCMT ref: 00431C2E
      • _wcslen.LIBCMT ref: 00431C3A
      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
      • String ID: :$\$\??\%s
      • API String ID: 2192556992-3457252023
      • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
      • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
      • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
      • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
      APIs
      • GetLocalTime.KERNEL32(?), ref: 004722A2
      • __swprintf.LIBCMT ref: 004722B9
      • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
      • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
      • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
      • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
      • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
      • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
      • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
      • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
      • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: FolderPath$LocalTime__swprintf
      • String ID: %.3d
      • API String ID: 3337348382-986655627
      • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
      • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
      • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
      • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
      APIs
      • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
      • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
      • FindClose.KERNEL32(00000000), ref: 0044291C
      • FindClose.KERNEL32(00000000), ref: 00442930
      • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
      • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
      • FindClose.KERNEL32(00000000), ref: 004429D4
        • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
      • FindClose.KERNEL32(00000000), ref: 004429E2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
      • String ID: *.*
      • API String ID: 2640511053-438819550
      • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
      • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
      • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
      • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
      APIs
      • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
      • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
      • GetLastError.KERNEL32 ref: 00433414
      • ExitWindowsEx.USER32(?,00000000), ref: 00433437
      • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
      • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 2938487562-3733053543
      • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
      • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
      • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
      • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
      APIs
        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
        • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
        • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
      • GetLengthSid.ADVAPI32(?), ref: 004461D0
      • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
      • GetLengthSid.ADVAPI32(?), ref: 00446241
      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
      • CopySid.ADVAPI32(00000000), ref: 00446271
      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
      • String ID:
      • API String ID: 1255039815-0
      • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
      • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
      • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
      • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
      APIs
      • __swprintf.LIBCMT ref: 00433073
      • __swprintf.LIBCMT ref: 00433085
      • __wcsicoll.LIBCMT ref: 00433092
      • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
      • LoadResource.KERNEL32(?,00000000), ref: 004330BD
      • LockResource.KERNEL32(00000000), ref: 004330CA
      • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
      • LoadResource.KERNEL32(?,00000000), ref: 00433105
      • SizeofResource.KERNEL32(?,00000000), ref: 00433114
      • LockResource.KERNEL32(?), ref: 00433120
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
      • String ID:
      • API String ID: 1158019794-0
      • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
      • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
      • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
      • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
      • String ID:
      • API String ID: 1737998785-0
      • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
      • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
      • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
      • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D627
      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
      • GetLastError.KERNEL32 ref: 0045D6BF
      • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Error$Mode$DiskFreeLastSpace
      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
      • API String ID: 4194297153-14809454
      • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
      • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
      • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
      • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove$_strncmp
      • String ID: @oH$\$^$h
      • API String ID: 2175499884-3701065813
      • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
      • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
      • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
      • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
      APIs
      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
      • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
      • bind.WSOCK32(00000000,?,00000010), ref: 00465356
      • WSAGetLastError.WSOCK32(00000000), ref: 00465363
      • closesocket.WSOCK32(00000000,00000000), ref: 00465377
      • listen.WSOCK32(00000000,00000005), ref: 00465381
      • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
      • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorLast$closesocket$bindlistensocket
      • String ID:
      • API String ID: 540024437-0
      • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
      • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
      • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
      • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID: ERCP$VUUU$VUUU$VUUU$XjH
      • API String ID: 0-2872873767
      • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
      • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
      • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
      • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
      APIs
      • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
      • __wsplitpath.LIBCMT ref: 00475644
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcscat.LIBCMT ref: 00475657
      • __wcsicoll.LIBCMT ref: 0047567B
      • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
      • CloseHandle.KERNEL32(00000000), ref: 004756BA
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
      • String ID:
      • API String ID: 2547909840-0
      • Opcode ID: 66fbdd7d2143bc3ea17fb0b89755d5829eeb71157ddfe2517e7fed7a99b972a8
      • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
      • Opcode Fuzzy Hash: 66fbdd7d2143bc3ea17fb0b89755d5829eeb71157ddfe2517e7fed7a99b972a8
      • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
      • Sleep.KERNEL32(0000000A), ref: 0045250B
      • FindNextFileW.KERNEL32(?,?), ref: 004525E9
      • FindClose.KERNEL32(?), ref: 004525FF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
      • String ID: *.*$\VH
      • API String ID: 2786137511-2657498754
      • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
      • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
      • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
      • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
      APIs
      • IsDebuggerPresent.KERNEL32 ref: 00421FC1
      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
      • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
      • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
      • TerminateProcess.KERNEL32(00000000), ref: 00422004
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
      • String ID: pqI
      • API String ID: 2579439406-2459173057
      • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
      • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
      • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
      • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
      APIs
      • __wcsicoll.LIBCMT ref: 00433349
      • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
      • __wcsicoll.LIBCMT ref: 00433375
      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsicollmouse_event
      • String ID: DOWN
      • API String ID: 1033544147-711622031
      • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
      • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
      • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
      • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
      APIs
      • GetKeyboardState.USER32(?), ref: 0044C3D2
      • SetKeyboardState.USER32(00000080), ref: 0044C3F6
      • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
      • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
      • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: KeyboardMessagePostState$InputSend
      • String ID:
      • API String ID: 3031425849-0
      • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
      • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
      • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
      • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
      APIs
        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
      • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
      • WSAGetLastError.WSOCK32(00000000), ref: 00476692
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorLastinet_addrsocket
      • String ID:
      • API String ID: 4170576061-0
      • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
      • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
      • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
      • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
      APIs
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • IsWindowVisible.USER32 ref: 0047A368
      • IsWindowEnabled.USER32 ref: 0047A378
      • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
      • IsIconic.USER32 ref: 0047A393
      • IsZoomed.USER32 ref: 0047A3A1
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$EnabledForegroundIconicVisibleZoomed
      • String ID:
      • API String ID: 292994002-0
      • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
      • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
      • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
      • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
      APIs
      • OpenClipboard.USER32(?), ref: 0046DCE7
      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
      • GetClipboardData.USER32(0000000D), ref: 0046DD01
      • CloseClipboard.USER32 ref: 0046DD0D
      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
      • CloseClipboard.USER32 ref: 0046DD41
      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
      • GetClipboardData.USER32(00000001), ref: 0046DD8D
      • CloseClipboard.USER32 ref: 0046DD99
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
      • String ID:
      • API String ID: 15083398-0
      • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
      • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
      • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
      • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: U$\
      • API String ID: 4104443479-100911408
      • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
      • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
      • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
      • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
      APIs
      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
      • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNext
      • String ID:
      • API String ID: 3541575487-0
      • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
      • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
      • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
      • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
      APIs
      • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
      • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
      • FindClose.KERNEL32(00000000), ref: 004339EB
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: FileFind$AttributesCloseFirst
      • String ID:
      • API String ID: 48322524-0
      • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
      • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
      • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
      • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
      APIs
      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
      • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Internet$AvailableDataErrorFileLastQueryRead
      • String ID:
      • API String ID: 901099227-0
      • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
      • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
      • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
      • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
      APIs
      • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Proc
      • String ID:
      • API String ID: 2346855178-0
      • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
      • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
      • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
      • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
      APIs
      • BlockInput.USER32(00000001), ref: 0045A38B
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: BlockInput
      • String ID:
      • API String ID: 3456056419-0
      • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
      • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
      • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
      • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
      APIs
      • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: LogonUser
      • String ID:
      • API String ID: 1244722697-0
      • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
      • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
      • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
      • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
      APIs
      • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: NameUser
      • String ID:
      • API String ID: 2645101109-0
      • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
      • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
      • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
      • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
      APIs
      • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
      • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
      • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
      • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID: N@
      • API String ID: 0-1509896676
      • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
      • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
      • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
      • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
      • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
      • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
      • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
      • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
      • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
      • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
      • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
      • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
      • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
      • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
      • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
      • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
      APIs
      • DeleteObject.GDI32(?), ref: 0045953B
      • DeleteObject.GDI32(?), ref: 00459551
      • DestroyWindow.USER32(?), ref: 00459563
      • GetDesktopWindow.USER32 ref: 00459581
      • GetWindowRect.USER32(00000000), ref: 00459588
      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
      • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
      • GetClientRect.USER32(00000000,?), ref: 004596F8
      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
      • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
      • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
      • GlobalLock.KERNEL32(00000000), ref: 0045978F
      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
      • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
      • CloseHandle.KERNEL32(00000000), ref: 004597AC
      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
      • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
      • GlobalFree.KERNEL32(00000000), ref: 004597E2
      • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
      • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
      • ShowWindow.USER32(?,00000004), ref: 00459865
      • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
      • GetStockObject.GDI32(00000011), ref: 004598CD
      • SelectObject.GDI32(00000000,00000000), ref: 004598D5
      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
      • DeleteDC.GDI32(00000000), ref: 004598F8
      • _wcslen.LIBCMT ref: 00459916
      • _wcscpy.LIBCMT ref: 0045993A
      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
      • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
      • GetDC.USER32(00000000), ref: 004599FC
      • SelectObject.GDI32(00000000,?), ref: 00459A0C
      • SelectObject.GDI32(00000000,00000007), ref: 00459A37
      • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
      • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
      • String ID: $AutoIt v3$DISPLAY$static
      • API String ID: 4040870279-2373415609
      • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
      • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
      • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
      • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
      APIs
      • GetSysColor.USER32(00000012), ref: 0044181E
      • SetTextColor.GDI32(?,?), ref: 00441826
      • GetSysColorBrush.USER32(0000000F), ref: 0044183D
      • GetSysColor.USER32(0000000F), ref: 00441849
      • SetBkColor.GDI32(?,?), ref: 00441864
      • SelectObject.GDI32(?,?), ref: 00441874
      • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
      • GetSysColor.USER32(00000010), ref: 004418B2
      • CreateSolidBrush.GDI32(00000000), ref: 004418B9
      • FrameRect.USER32(?,?,00000000), ref: 004418CA
      • DeleteObject.GDI32(?), ref: 004418D5
      • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
      • FillRect.USER32(?,?,?), ref: 00441970
        • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
        • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
        • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
        • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
        • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
        • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
        • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
        • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
        • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
        • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
        • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
        • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
        • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
      • String ID:
      • API String ID: 69173610-0
      • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
      • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
      • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
      • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
      APIs
      • DestroyWindow.USER32(?), ref: 004590F2
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
      • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
      • GetClientRect.USER32(00000000,?), ref: 0045924E
      • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
      • GetStockObject.GDI32(00000011), ref: 004592AC
      • SelectObject.GDI32(00000000,00000000), ref: 004592B4
      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
      • DeleteDC.GDI32(00000000), ref: 004592D6
      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
      • GetStockObject.GDI32(00000011), ref: 004593D3
      • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
      • API String ID: 2910397461-517079104
      • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
      • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
      • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
      • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
      APIs
      • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
      • SetCursor.USER32(00000000), ref: 0043075B
      • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
      • SetCursor.USER32(00000000), ref: 00430773
      • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
      • SetCursor.USER32(00000000), ref: 0043078B
      • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
      • SetCursor.USER32(00000000), ref: 004307A3
      • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
      • SetCursor.USER32(00000000), ref: 004307BB
      • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
      • SetCursor.USER32(00000000), ref: 004307D3
      • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
      • SetCursor.USER32(00000000), ref: 004307EB
      • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
      • SetCursor.USER32(00000000), ref: 00430803
      • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
      • SetCursor.USER32(00000000), ref: 0043081B
      • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
      • SetCursor.USER32(00000000), ref: 00430833
      • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
      • SetCursor.USER32(00000000), ref: 0043084B
      • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
      • SetCursor.USER32(00000000), ref: 00430863
      • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
      • SetCursor.USER32(00000000), ref: 0043087B
      • SetCursor.USER32(00000000), ref: 00430887
      • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
      • SetCursor.USER32(00000000), ref: 0043089F
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Cursor$Load
      • String ID:
      • API String ID: 1675784387-0
      • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
      • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
      • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
      • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
      APIs
      • GetSysColor.USER32(0000000E), ref: 00430913
      • SetTextColor.GDI32(?,00000000), ref: 0043091B
      • GetSysColor.USER32(00000012), ref: 00430933
      • SetTextColor.GDI32(?,?), ref: 0043093B
      • GetSysColorBrush.USER32(0000000F), ref: 0043094E
      • GetSysColor.USER32(0000000F), ref: 00430959
      • CreateSolidBrush.GDI32(?), ref: 00430962
      • GetSysColor.USER32(00000011), ref: 00430979
      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
      • SelectObject.GDI32(?,00000000), ref: 0043099C
      • SetBkColor.GDI32(?,?), ref: 004309A6
      • SelectObject.GDI32(?,?), ref: 004309B4
      • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
      • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
      • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
      • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
      • DrawFocusRect.USER32(?,?), ref: 00430A91
      • GetSysColor.USER32(00000011), ref: 00430A9F
      • SetTextColor.GDI32(?,00000000), ref: 00430AA7
      • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
      • SelectObject.GDI32(?,?), ref: 00430AD0
      • DeleteObject.GDI32(00000105), ref: 00430ADC
      • SelectObject.GDI32(?,?), ref: 00430AE3
      • DeleteObject.GDI32(?), ref: 00430AE9
      • SetTextColor.GDI32(?,?), ref: 00430AF0
      • SetBkColor.GDI32(?,?), ref: 00430AFB
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
      • String ID:
      • API String ID: 1582027408-0
      • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
      • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
      • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
      • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
      APIs
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
      • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CloseConnectCreateRegistry
      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
      • API String ID: 3217815495-966354055
      • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
      • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
      • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
      • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
      APIs
      • GetCursorPos.USER32(?), ref: 004566AE
      • GetDesktopWindow.USER32 ref: 004566C3
      • GetWindowRect.USER32(00000000), ref: 004566CA
      • GetWindowLongW.USER32(?,000000F0), ref: 00456722
      • GetWindowLongW.USER32(?,000000F0), ref: 00456735
      • DestroyWindow.USER32(?), ref: 00456746
      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
      • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
      • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
      • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
      • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
      • IsWindowVisible.USER32(?), ref: 0045682C
      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
      • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
      • GetWindowRect.USER32(?,?), ref: 00456873
      • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
      • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
      • CopyRect.USER32(?,?), ref: 004568BE
      • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
      • String ID: ($,$tooltips_class32
      • API String ID: 225202481-3320066284
      • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
      • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
      • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
      • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
      APIs
      • OpenClipboard.USER32(?), ref: 0046DCE7
      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
      • GetClipboardData.USER32(0000000D), ref: 0046DD01
      • CloseClipboard.USER32 ref: 0046DD0D
      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
      • CloseClipboard.USER32 ref: 0046DD41
      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
      • GetClipboardData.USER32(00000001), ref: 0046DD8D
      • CloseClipboard.USER32 ref: 0046DD99
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
      • String ID:
      • API String ID: 15083398-0
      • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
      • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
      • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
      • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetWindowRect.USER32(?,?), ref: 00471CF7
      • GetClientRect.USER32(?,?), ref: 00471D05
      • GetSystemMetrics.USER32(00000007), ref: 00471D0D
      • GetSystemMetrics.USER32(00000008), ref: 00471D20
      • GetSystemMetrics.USER32(00000004), ref: 00471D42
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
      • GetSystemMetrics.USER32(00000007), ref: 00471D79
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
      • GetSystemMetrics.USER32(00000008), ref: 00471DAB
      • GetSystemMetrics.USER32(00000004), ref: 00471DCF
      • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
      • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
      • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
      • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
      • GetClientRect.USER32(?,?), ref: 00471E8A
      • GetStockObject.GDI32(00000011), ref: 00471EA6
      • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
      • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
      • String ID: @$AutoIt v3 GUI
      • API String ID: 867697134-3359773793
      • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
      • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
      • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
      • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
      • API String ID: 1503153545-1459072770
      • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
      • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
      • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
      • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsicoll$__wcsnicmp
      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
      • API String ID: 790654849-32604322
      • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
      • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
      • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
      • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
      • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
      • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
      • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
      APIs
        • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
      • _fseek.LIBCMT ref: 00452B3B
      • __wsplitpath.LIBCMT ref: 00452B9B
      • _wcscpy.LIBCMT ref: 00452BB0
      • _wcscat.LIBCMT ref: 00452BC5
      • __wsplitpath.LIBCMT ref: 00452BEF
      • _wcscat.LIBCMT ref: 00452C07
      • _wcscat.LIBCMT ref: 00452C1C
      • __fread_nolock.LIBCMT ref: 00452C53
      • __fread_nolock.LIBCMT ref: 00452C64
      • __fread_nolock.LIBCMT ref: 00452C83
      • __fread_nolock.LIBCMT ref: 00452C94
      • __fread_nolock.LIBCMT ref: 00452CB5
      • __fread_nolock.LIBCMT ref: 00452CC6
      • __fread_nolock.LIBCMT ref: 00452CD7
      • __fread_nolock.LIBCMT ref: 00452CE8
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
      • __fread_nolock.LIBCMT ref: 00452D78
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
      • String ID:
      • API String ID: 2054058615-0
      • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
      • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
      • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
      • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
      APIs
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window
      • String ID: 0
      • API String ID: 2353593579-4108050209
      • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
      • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
      • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
      • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
      APIs
      • GetSysColor.USER32(0000000F), ref: 0044A05E
      • GetClientRect.USER32(?,?), ref: 0044A0D1
      • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
      • GetWindowDC.USER32(?), ref: 0044A0F6
      • GetPixel.GDI32(00000000,?,?), ref: 0044A108
      • ReleaseDC.USER32(?,?), ref: 0044A11B
      • GetSysColor.USER32(0000000F), ref: 0044A131
      • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
      • GetSysColor.USER32(0000000F), ref: 0044A14F
      • GetSysColor.USER32(00000005), ref: 0044A15B
      • GetWindowDC.USER32(?), ref: 0044A1BE
      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
      • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
      • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
      • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
      • ReleaseDC.USER32(?,00000000), ref: 0044A229
      • SetBkColor.GDI32(?,00000000), ref: 0044A24C
      • GetSysColor.USER32(00000008), ref: 0044A265
      • SetTextColor.GDI32(?,00000000), ref: 0044A270
      • SetBkMode.GDI32(?,00000001), ref: 0044A282
      • GetStockObject.GDI32(00000005), ref: 0044A28A
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
      • String ID:
      • API String ID: 1744303182-0
      • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
      • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
      • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
      • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
      • __mtterm.LIBCMT ref: 00417C34
        • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
        • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
      • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
      • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
      • __init_pointers.LIBCMT ref: 00417CE6
      • __calloc_crt.LIBCMT ref: 00417D54
      • GetCurrentThreadId.KERNEL32 ref: 00417D80
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
      • API String ID: 4163708885-3819984048
      • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
      • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
      • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
      • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID: >>>AUTOIT SCRIPT<<<$\
      • API String ID: 0-1896584978
      • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
      • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
      • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
      • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsicoll$IconLoad
      • String ID: blank$info$question$stop$warning
      • API String ID: 2485277191-404129466
      • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
      • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
      • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
      • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
      APIs
      • LoadIconW.USER32(?,00000063), ref: 0045464C
      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
      • SetWindowTextW.USER32(?,?), ref: 00454678
      • GetDlgItem.USER32(?,000003EA), ref: 00454690
      • SetWindowTextW.USER32(00000000,?), ref: 00454697
      • GetDlgItem.USER32(?,000003E9), ref: 004546A8
      • SetWindowTextW.USER32(00000000,?), ref: 004546AF
      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
      • GetWindowRect.USER32(?,?), ref: 004546F5
      • SetWindowTextW.USER32(?,?), ref: 00454765
      • GetDesktopWindow.USER32 ref: 0045476F
      • GetWindowRect.USER32(00000000), ref: 00454776
      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
      • GetClientRect.USER32(?,?), ref: 004547D2
      • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
      • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
      • String ID:
      • API String ID: 3869813825-0
      • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
      • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
      • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
      • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
      APIs
      • _wcslen.LIBCMT ref: 00464B28
      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
      • _wcslen.LIBCMT ref: 00464C28
      • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
      • _wcslen.LIBCMT ref: 00464CBA
      • _wcslen.LIBCMT ref: 00464CD0
      • _wcslen.LIBCMT ref: 00464CEF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$Directory$CurrentSystem
      • String ID: D
      • API String ID: 1914653954-2746444292
      • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
      • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
      • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
      • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
      APIs
      • _wcsncpy.LIBCMT ref: 0045CE39
      • __wsplitpath.LIBCMT ref: 0045CE78
      • _wcscat.LIBCMT ref: 0045CE8B
      • _wcscat.LIBCMT ref: 0045CE9E
      • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
      • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
      • _wcscpy.LIBCMT ref: 0045CF61
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
      • String ID: *.*
      • API String ID: 1153243558-438819550
      • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
      • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
      • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
      • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsicoll
      • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
      • API String ID: 3832890014-4202584635
      • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
      • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
      • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
      • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
      APIs
      • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
      • GetFocus.USER32 ref: 0046A0DD
      • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessagePost$CtrlFocus
      • String ID: 0
      • API String ID: 1534620443-4108050209
      • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
      • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
      • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
      • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
      APIs
      • DestroyWindow.USER32(?), ref: 004558E3
      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$CreateDestroy
      • String ID: ,$tooltips_class32
      • API String ID: 1109047481-3856767331
      • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
      • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
      • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
      • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
      APIs
      • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
      • GetMenuItemCount.USER32(?), ref: 00468C45
      • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
      • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
      • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
      • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
      • GetMenuItemCount.USER32 ref: 00468CFD
      • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
      • GetCursorPos.USER32(?), ref: 00468D3F
      • SetForegroundWindow.USER32(?), ref: 00468D49
      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
      • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
      • String ID: 0
      • API String ID: 1441871840-4108050209
      • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
      • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
      • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
      • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
      APIs
      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
      • __swprintf.LIBCMT ref: 00460915
      • __swprintf.LIBCMT ref: 0046092D
      • _wprintf.LIBCMT ref: 004609E1
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
      • API String ID: 3631882475-2268648507
      • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
      • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
      • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
      • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
      APIs
      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
      • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
      • SendMessageW.USER32 ref: 00471740
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
      • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
      • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
      • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
      • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
      • SendMessageW.USER32 ref: 0047184F
      • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
      • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
      • String ID:
      • API String ID: 4116747274-0
      • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
      • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
      • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
      • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
      APIs
      • GetClassNameW.USER32(?,?,00000100), ref: 00461678
      • _wcslen.LIBCMT ref: 00461683
      • __swprintf.LIBCMT ref: 00461721
      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
      • GetClassNameW.USER32(?,?,00000400), ref: 00461811
      • GetDlgCtrlID.USER32(?), ref: 00461869
      • GetWindowRect.USER32(?,?), ref: 004618A4
      • GetParent.USER32(?), ref: 004618C3
      • ScreenToClient.USER32(00000000), ref: 004618CA
      • GetClassNameW.USER32(?,?,00000100), ref: 00461941
      • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
      • String ID: %s%u
      • API String ID: 1899580136-679674701
      • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
      • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
      • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
      • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
      APIs
      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
      • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
      • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: InfoItemMenu$Sleep
      • String ID: 0
      • API String ID: 1196289194-4108050209
      • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
      • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
      • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
      • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
      APIs
      • GetDC.USER32(00000000), ref: 0043143E
      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
      • CreateCompatibleDC.GDI32(00000000), ref: 00431459
      • SelectObject.GDI32(00000000,?), ref: 00431466
      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
      • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
      • String ID: (
      • API String ID: 3300687185-3887548279
      • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
      • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
      • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
      • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
      APIs
        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
      • GetDriveTypeW.KERNEL32 ref: 0045DB32
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
      • API String ID: 1976180769-4113822522
      • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
      • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
      • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
      • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$_wcsncpy$LocalTime__fassign
      • String ID:
      • API String ID: 461458858-0
      • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
      • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
      • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
      • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
      APIs
      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
      • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
      • GlobalLock.KERNEL32(00000000), ref: 004300F6
      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
      • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
      • CloseHandle.KERNEL32(00000000), ref: 00430113
      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
      • GlobalFree.KERNEL32(00000000), ref: 00430150
      • GetObjectW.GDI32(?,00000018,?), ref: 00430177
      • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
      • DeleteObject.GDI32(?), ref: 004301D0
      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
      • String ID:
      • API String ID: 3969911579-0
      • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
      • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
      • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
      • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
      • String ID: 0
      • API String ID: 956284711-4108050209
      • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
      • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
      • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
      • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
      • String ID: 0.0.0.0
      • API String ID: 1965227024-3771769585
      • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
      • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
      • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
      • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: SendString$_memmove_wcslen
      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
      • API String ID: 369157077-1007645807
      • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
      • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
      • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
      • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
      APIs
      • GetParent.USER32 ref: 00445BF8
      • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
      • __wcsicoll.LIBCMT ref: 00445C33
      • __wcsicoll.LIBCMT ref: 00445C4F
      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsicoll$ClassMessageNameParentSend
      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
      • API String ID: 3125838495-3381328864
      • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
      • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
      • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
      • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
      APIs
      • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
      • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
      • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
      • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
      • SendMessageW.USER32(?,00000402,?), ref: 00449399
      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$CharNext
      • String ID:
      • API String ID: 1350042424-0
      • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
      • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
      • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
      • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
      APIs
        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
      • GetDriveTypeW.KERNEL32(?), ref: 004787B9
      • _wcscpy.LIBCMT ref: 004787E5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: BuffCharDriveLowerType_wcscpy_wcslen
      • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
      • API String ID: 3052893215-2127371420
      • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
      • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
      • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
      • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
      APIs
      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
      • __swprintf.LIBCMT ref: 0045E7F7
      • _wprintf.LIBCMT ref: 0045E8B3
      • _wprintf.LIBCMT ref: 0045E8D7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
      • API String ID: 2295938435-2354261254
      • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
      • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
      • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
      • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __swprintf_wcscpy$__i64tow__itow
      • String ID: %.15g$0x%p$False$True
      • API String ID: 3038501623-2263619337
      • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
      • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
      • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
      • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
      APIs
      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
      • __swprintf.LIBCMT ref: 0045E5F6
      • _wprintf.LIBCMT ref: 0045E6A3
      • _wprintf.LIBCMT ref: 0045E6C7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
      • API String ID: 2295938435-8599901
      • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
      • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
      • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
      • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
      APIs
      • timeGetTime.WINMM ref: 00443B67
        • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
      • Sleep.KERNEL32(0000000A), ref: 00443B9F
      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
      • SetActiveWindow.USER32(00000000), ref: 00443BEC
      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
      • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
      • Sleep.KERNEL32(000000FA), ref: 00443C2D
      • IsWindow.USER32(00000000), ref: 00443C3A
      • EndDialog.USER32(00000000,00000000), ref: 00443C4C
        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
      • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
      • String ID: BUTTON
      • API String ID: 1834419854-3405671355
      • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
      • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
      • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
      • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
      APIs
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
      • LoadStringW.USER32(00000000), ref: 00454040
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • _wprintf.LIBCMT ref: 00454074
      • __swprintf.LIBCMT ref: 004540A3
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
      • API String ID: 455036304-4153970271
      • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
      • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
      • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
      • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
      APIs
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
      • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
      • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
      • _memmove.LIBCMT ref: 00467EB8
      • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
      • _memmove.LIBCMT ref: 00467F6C
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
      • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
      • String ID:
      • API String ID: 2170234536-0
      • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
      • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
      • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
      • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
      APIs
      • GetKeyboardState.USER32(?), ref: 00453CE0
      • SetKeyboardState.USER32(?), ref: 00453D3B
      • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
      • GetKeyState.USER32(000000A0), ref: 00453D75
      • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
      • GetKeyState.USER32(000000A1), ref: 00453DB5
      • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
      • GetKeyState.USER32(00000011), ref: 00453DEF
      • GetAsyncKeyState.USER32(00000012), ref: 00453E18
      • GetKeyState.USER32(00000012), ref: 00453E26
      • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
      • GetKeyState.USER32(0000005B), ref: 00453E5D
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
      • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
      • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
      • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
      APIs
      • GetDlgItem.USER32(?,00000001), ref: 004357DB
      • GetWindowRect.USER32(00000000,?), ref: 004357ED
      • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
      • GetDlgItem.USER32(?,00000002), ref: 0043586A
      • GetWindowRect.USER32(00000000,?), ref: 0043587C
      • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
      • GetDlgItem.USER32(?,000003E9), ref: 004358DC
      • GetWindowRect.USER32(00000000,?), ref: 004358EE
      • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
      • GetDlgItem.USER32(?,000003EA), ref: 00435941
      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
      • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$ItemMoveRect$Invalidate
      • String ID:
      • API String ID: 3096461208-0
      • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
      • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
      • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
      • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
      APIs
      • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
      • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
      • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
      • DeleteObject.GDI32(?), ref: 0047151E
      • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
      • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
      • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
      • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
      • DeleteObject.GDI32(?), ref: 004715EA
      • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
      • String ID:
      • API String ID: 3218148540-0
      • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
      • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
      • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
      • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
      • String ID:
      • API String ID: 136442275-0
      • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
      • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
      • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
      • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
      APIs
      • _wcsncpy.LIBCMT ref: 00467490
      • _wcsncpy.LIBCMT ref: 004674BC
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • _wcstok.LIBCMT ref: 004674FF
        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
      • _wcstok.LIBCMT ref: 004675B2
      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
      • _wcslen.LIBCMT ref: 00467793
      • _wcscpy.LIBCMT ref: 00467641
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcslen.LIBCMT ref: 004677BD
      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
      • String ID: X
      • API String ID: 3104067586-3081909835
      • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
      • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
      • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
      • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
      APIs
      • GetClassNameW.USER32(?,?,00000400), ref: 00461056
      • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
      • _wcslen.LIBCMT ref: 004610A3
      • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
      • GetClassNameW.USER32(?,?,00000400), ref: 00461124
      • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
      • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
      • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
      • GetWindowRect.USER32(?,?), ref: 00461248
        • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
      • String ID: ThumbnailClass
      • API String ID: 4136854206-1241985126
      • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
      • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
      • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
      • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
      APIs
      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
      • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
      • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
      • GetClientRect.USER32(?,?), ref: 00471A1A
      • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
      • DestroyIcon.USER32(?), ref: 00471AF4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
      • String ID: 2
      • API String ID: 1331449709-450215437
      • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
      • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
      • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
      • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
      APIs
      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
      • __swprintf.LIBCMT ref: 00460915
      • __swprintf.LIBCMT ref: 0046092D
      • _wprintf.LIBCMT ref: 004609E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
      • API String ID: 3054410614-2561132961
      • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
      • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
      • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
      • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
      • CLSIDFromString.OLE32(?,?), ref: 004587B3
      • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
      • RegCloseKey.ADVAPI32(?), ref: 004587C5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
      • API String ID: 600699880-22481851
      • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
      • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
      • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
      • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: DestroyWindow
      • String ID: static
      • API String ID: 3375834691-2160076837
      • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
      • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
      • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
      • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D959
      • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$DriveType
      • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
      • API String ID: 2907320926-3566645568
      • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
      • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
      • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
      • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
      APIs
        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
      • DestroyAcceleratorTable.USER32(?), ref: 0047094A
      • ImageList_Destroy.COMCTL32(?), ref: 004709AD
      • ImageList_Destroy.COMCTL32(?), ref: 004709C5
      • ImageList_Destroy.COMCTL32(?), ref: 004709D5
      • DeleteObject.GDI32(?), ref: 00470A04
      • DestroyIcon.USER32(?), ref: 00470A1C
      • DeleteObject.GDI32(?), ref: 00470A34
      • DestroyWindow.USER32(?), ref: 00470A4C
      • DestroyIcon.USER32(?), ref: 00470A73
      • DestroyIcon.USER32(?), ref: 00470A81
      • KillTimer.USER32(00000000,00000000), ref: 00470B00
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
      • String ID:
      • API String ID: 1237572874-0
      • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
      • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
      • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
      • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
      APIs
      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
      • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
      • VariantInit.OLEAUT32(?), ref: 004793E1
      • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
      • VariantCopy.OLEAUT32(?,?), ref: 00479461
      • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
      • VariantClear.OLEAUT32(?), ref: 00479489
      • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
      • VariantClear.OLEAUT32(?), ref: 004794CA
      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
      • String ID:
      • API String ID: 2706829360-0
      • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
      • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
      • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
      • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
      APIs
      • GetKeyboardState.USER32(?), ref: 0044480E
      • GetAsyncKeyState.USER32(000000A0), ref: 00444899
      • GetKeyState.USER32(000000A0), ref: 004448AA
      • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
      • GetKeyState.USER32(000000A1), ref: 004448D9
      • GetAsyncKeyState.USER32(00000011), ref: 004448F5
      • GetKeyState.USER32(00000011), ref: 00444903
      • GetAsyncKeyState.USER32(00000012), ref: 0044491F
      • GetKeyState.USER32(00000012), ref: 0044492D
      • GetAsyncKeyState.USER32(0000005B), ref: 00444949
      • GetKeyState.USER32(0000005B), ref: 00444958
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
      • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
      • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
      • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: InitVariant$_malloc_wcscpy_wcslen
      • String ID:
      • API String ID: 3413494760-0
      • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
      • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
      • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
      • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressProc_free_malloc$_strcat_strlen
      • String ID: AU3_FreeVar
      • API String ID: 2634073740-771828931
      • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
      • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
      • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
      • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
      APIs
      • CoInitialize.OLE32 ref: 0046C63A
      • CoUninitialize.OLE32 ref: 0046C645
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
        • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
      • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
      • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
      • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
      • IIDFromString.OLE32(?,?), ref: 0046C705
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
      • API String ID: 2294789929-1287834457
      • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
      • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
      • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
      • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
      APIs
        • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
        • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
      • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
      • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
      • ImageList_EndDrag.COMCTL32 ref: 00471169
      • ReleaseCapture.USER32 ref: 0047116F
      • SetWindowTextW.USER32(?,00000000), ref: 00471206
      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
      • String ID: @GUI_DRAGFILE$@GUI_DROPID
      • API String ID: 2483343779-2107944366
      • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
      • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
      • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
      • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
      APIs
      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
      • _wcslen.LIBCMT ref: 00450720
      • _wcscat.LIBCMT ref: 00450733
      • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
      • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$Window_wcscat_wcslen
      • String ID: -----$SysListView32
      • API String ID: 4008455318-3975388722
      • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
      • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
      • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
      • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
      • GetDlgCtrlID.USER32(00000000), ref: 00469C84
      • GetParent.USER32 ref: 00469C98
      • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
      • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
      • GetParent.USER32 ref: 00469CBC
      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$CtrlParent$_memmove_wcslen
      • String ID: ComboBox$ListBox
      • API String ID: 2360848162-1403004172
      • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
      • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
      • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
      • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
      • String ID:
      • API String ID: 262282135-0
      • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
      • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
      • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
      • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
      APIs
      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
      • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
      • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
      • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
      • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
      • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$LongWindow
      • String ID:
      • API String ID: 312131281-0
      • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
      • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
      • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
      • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
      APIs
        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
      • SendMessageW.USER32(753E23D0,00001001,00000000,?), ref: 00448E16
      • SendMessageW.USER32(753E23D0,00001026,00000000,?), ref: 00448E25
        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$BrushCreateDeleteObjectSolid
      • String ID:
      • API String ID: 3771399671-0
      • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
      • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
      • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
      • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
      APIs
      • GetCurrentThreadId.KERNEL32 ref: 00434643
      • GetForegroundWindow.USER32(00000000), ref: 00434655
      • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
      • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
      • String ID:
      • API String ID: 2156557900-0
      • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
      • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
      • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
      • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
      • API String ID: 0-1603158881
      • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
      • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
      • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
      • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
      APIs
      • CreateMenu.USER32 ref: 00448603
      • SetMenu.USER32(?,00000000), ref: 00448613
      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
      • IsMenu.USER32(?), ref: 004486AB
      • CreatePopupMenu.USER32 ref: 004486B5
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
      • DrawMenuBar.USER32 ref: 004486F5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$CreateItem$DrawInfoInsertPopup
      • String ID: 0
      • API String ID: 161812096-4108050209
      • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
      • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
      • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
      • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
      APIs
      • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe), ref: 00434057
      • LoadStringW.USER32(00000000), ref: 00434060
      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
      • LoadStringW.USER32(00000000), ref: 00434078
      • _wprintf.LIBCMT ref: 004340A1
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
      Strings
      • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
      • C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe, xrefs: 00434040
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: HandleLoadModuleString$Message_wprintf
      • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
      • API String ID: 3648134473-2756160312
      • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
      • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
      • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
      • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
      • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
      • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
      • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
      • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
      • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
      • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,0040F545,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,004A90E8,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,?,0040F545), ref: 0041013C
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • lstrcmpiW.KERNEL32(?,?), ref: 00453900
      • MoveFileW.KERNEL32(?,?), ref: 00453932
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: File$AttributesFullMoveNamePathlstrcmpi
      • String ID:
      • API String ID: 978794511-0
      • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
      • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
      • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
      • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
      • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
      • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
      • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
      • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
      • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
      • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove$_memcmp
      • String ID: '$\$h
      • API String ID: 2205784470-1303700344
      • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
      • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
      • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
      • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
      APIs
      • VariantInit.OLEAUT32(00000000), ref: 0045EA56
      • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
      • VariantClear.OLEAUT32 ref: 0045EA6D
      • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
      • __swprintf.LIBCMT ref: 0045EC33
      • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
      Strings
      • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$InitTime$ClearCopySystem__swprintf
      • String ID: %4d%02d%02d%02d%02d%02d
      • API String ID: 2441338619-1568723262
      • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
      • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
      • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
      • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
      APIs
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
      • Sleep.KERNEL32(0000000A), ref: 0042C67F
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Interlocked$DecrementIncrement$Sleep
      • String ID: @COM_EVENTOBJ
      • API String ID: 327565842-2228938565
      • Opcode ID: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
      • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
      • Opcode Fuzzy Hash: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
      • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
      APIs
      • VariantClear.OLEAUT32(?), ref: 0047031B
      • VariantClear.OLEAUT32(?), ref: 0047044F
      • VariantInit.OLEAUT32(?), ref: 004704A3
      • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
      • VariantClear.OLEAUT32(?), ref: 00470516
        • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
      • VariantCopy.OLEAUT32(?,?), ref: 0047057A
        • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
      • VariantClear.OLEAUT32(00000000), ref: 0047060D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$Clear$Copy$CallDispFuncInit
      • String ID: H
      • API String ID: 3613100350-2852464175
      • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
      • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
      • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
      • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
      APIs
      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
      • DestroyWindow.USER32(?), ref: 00426F50
      • UnregisterHotKey.USER32(?), ref: 00426F77
      • FreeLibrary.KERNEL32(?), ref: 0042701F
      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
      • String ID: close all
      • API String ID: 4174999648-3243417748
      • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
      • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
      • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
      • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
      APIs
      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
      • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
      • String ID:
      • API String ID: 1291720006-3916222277
      • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
      • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
      • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
      • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
      APIs
      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
      • IsMenu.USER32(?), ref: 0045FC5F
      • CreatePopupMenu.USER32 ref: 0045FC97
      • GetMenuItemCount.USER32(?), ref: 0045FCFD
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$Item$CountCreateInfoInsertPopup
      • String ID: 0$2
      • API String ID: 93392585-3793063076
      • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
      • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
      • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
      • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
      APIs
      • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
      • VariantClear.OLEAUT32(?), ref: 00435320
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
      • VariantClear.OLEAUT32(?), ref: 004353B3
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
      • String ID: crts
      • API String ID: 586820018-3724388283
      • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
      • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
      • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
      • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,0040F545,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,004A90E8,C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe,?,0040F545), ref: 0041013C
      • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
      • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
      • _wcscat.LIBCMT ref: 0044BCAF
      • _wcslen.LIBCMT ref: 0044BCBB
      • _wcslen.LIBCMT ref: 0044BCD1
      • SHFileOperationW.SHELL32(?), ref: 0044BD17
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
      • String ID: \*.*
      • API String ID: 2326526234-1173974218
      • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
      • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
      • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
      • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
      APIs
        • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
      • _wcslen.LIBCMT ref: 004335F2
      • GetFileAttributesW.KERNEL32(?), ref: 0043361C
      • GetLastError.KERNEL32 ref: 0043362B
      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
      • _wcsrchr.LIBCMT ref: 00433666
        • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
      • String ID: \
      • API String ID: 321622961-2967466578
      • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
      • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
      • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
      • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsnicmp
      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
      • API String ID: 1038674560-2734436370
      • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
      • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
      • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
      • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
      • __lock.LIBCMT ref: 00417981
        • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
        • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
        • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
      • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
      • __lock.LIBCMT ref: 004179A2
      • ___addlocaleref.LIBCMT ref: 004179C0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
      • String ID: KERNEL32.DLL$pI
      • API String ID: 637971194-197072765
      • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
      • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
      • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
      • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove$_malloc
      • String ID:
      • API String ID: 1938898002-0
      • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
      • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
      • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
      • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
      APIs
        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
      • SendMessageW.USER32(753E23D0,00001001,00000000,?), ref: 00448E16
      • SendMessageW.USER32(753E23D0,00001026,00000000,?), ref: 00448E25
        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$BrushCreateDeleteObjectSolid
      • String ID:
      • API String ID: 3771399671-0
      • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
      • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
      • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
      • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
      APIs
      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
      • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
      • _memmove.LIBCMT ref: 0044B555
      • _memmove.LIBCMT ref: 0044B578
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
      • String ID:
      • API String ID: 2737351978-0
      • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
      • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
      • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
      • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 0041523A
      • __calloc_crt.LIBCMT ref: 00415246
      • __getptd.LIBCMT ref: 00415253
      • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
      • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
      • _free.LIBCMT ref: 0041529E
      • __dosmaperr.LIBCMT ref: 004152A9
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
      • String ID:
      • API String ID: 3638380555-0
      • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
      • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
      • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
      • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
      APIs
      • VariantInit.OLEAUT32(?), ref: 0046C96E
        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
        • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$Copy$ClearErrorInitLast
      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
      • API String ID: 3207048006-625585964
      • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
      • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
      • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
      • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
      APIs
      • WSAStartup.WSOCK32(00000101,?), ref: 00465559
        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
      • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
      • gethostbyname.WSOCK32(?), ref: 004655A6
      • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
      • _memmove.LIBCMT ref: 004656CA
      • GlobalFree.KERNEL32(00000000), ref: 0046575C
      • WSACleanup.WSOCK32 ref: 00465762
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
      • String ID:
      • API String ID: 2945290962-0
      • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
      • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
      • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
      • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
      APIs
      • GetSystemMetrics.USER32(0000000F), ref: 00440527
      • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
      • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
      • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
      • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
      • String ID:
      • API String ID: 1457242333-0
      • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
      • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
      • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
      • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ConnectRegistry_memmove_wcslen
      • String ID:
      • API String ID: 15295421-0
      • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
      • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
      • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
      • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcstok.LIBCMT ref: 004675B2
        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
      • _wcscpy.LIBCMT ref: 00467641
      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
      • _wcslen.LIBCMT ref: 00467793
      • _wcslen.LIBCMT ref: 004677BD
        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
      • String ID: X
      • API String ID: 780548581-3081909835
      • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
      • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
      • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
      • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
      • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
      • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
      • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
      • CloseFigure.GDI32(?), ref: 0044751F
      • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
      • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
      • String ID:
      • API String ID: 4082120231-0
      • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
      • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
      • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
      • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
      • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
      • RegCloseKey.ADVAPI32(?), ref: 0046B49D
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
      • String ID:
      • API String ID: 2027346449-0
      • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
      • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
      • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
      • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • GetMenu.USER32 ref: 0047A703
      • GetMenuItemCount.USER32(00000000), ref: 0047A74F
      • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
      • _wcslen.LIBCMT ref: 0047A79E
      • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
      • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
      • String ID:
      • API String ID: 3257027151-0
      • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
      • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
      • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
      • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
      APIs
      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
      • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorLastselect
      • String ID:
      • API String ID: 215497628-0
      • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
      • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
      • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
      • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
      APIs
      • GetParent.USER32(?), ref: 0044443B
      • GetKeyboardState.USER32(?), ref: 00444450
      • SetKeyboardState.USER32(?), ref: 004444A4
      • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
      • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
      • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
      • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
      • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
      APIs
      • GetParent.USER32(?), ref: 00444633
      • GetKeyboardState.USER32(?), ref: 00444648
      • SetKeyboardState.USER32(?), ref: 0044469C
      • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
      • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
      • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
      • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
      • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
      • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
      • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __snwprintf__wcsicoll_wcscpy
      • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
      • API String ID: 1729044348-3025626884
      • Opcode ID: 7769a92cfab6b8d3931dc5c653c39d142ecf4e8a499bfed4412259d626728bb2
      • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
      • Opcode Fuzzy Hash: 7769a92cfab6b8d3931dc5c653c39d142ecf4e8a499bfed4412259d626728bb2
      • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
      APIs
      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
      • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
      • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
      • String ID:
      • API String ID: 2354583917-0
      • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
      • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
      • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
      • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
      • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
      • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
      • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
      APIs
      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Enable$Show$MessageMoveSend
      • String ID:
      • API String ID: 896007046-0
      • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
      • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
      • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
      • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
      APIs
      • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
      • GetFocus.USER32 ref: 00448ACF
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Enable$Show$FocusMessageSend
      • String ID:
      • API String ID: 3429747543-0
      • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
      • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
      • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
      • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D459
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
      • __swprintf.LIBCMT ref: 0045D4E9
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume__swprintf
      • String ID: %lu$\VH
      • API String ID: 3164766367-2432546070
      • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
      • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
      • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
      • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
      APIs
      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
      • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
      • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: Msctls_Progress32
      • API String ID: 3850602802-3636473452
      • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
      • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
      • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
      • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
      • String ID:
      • API String ID: 3985565216-0
      • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
      • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
      • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
      • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
      APIs
      • _malloc.LIBCMT ref: 0041F707
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • _free.LIBCMT ref: 0041F71A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AllocateHeap_free_malloc
      • String ID: [B
      • API String ID: 1020059152-632041663
      • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
      • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
      • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
      • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 00413DA4
      • __calloc_crt.LIBCMT ref: 00413DB0
      • __getptd.LIBCMT ref: 00413DBD
      • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
      • _free.LIBCMT ref: 00413E07
      • __dosmaperr.LIBCMT ref: 00413E12
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
      • String ID:
      • API String ID: 155776804-0
      • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
      • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
      • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
      • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
      APIs
        • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
        • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
      • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
      • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
      • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
      • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
      • String ID:
      • API String ID: 1957940570-0
      • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
      • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
      • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
      • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 00413D20
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
      • ExitThread.KERNEL32 ref: 00413D4E
      • GetCurrentThreadId.KERNEL32 ref: 00413D54
      • __freefls@4.LIBCMT ref: 00413D74
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
      • String ID:
      • API String ID: 259663610-0
      • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
      • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
      • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
      • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
      APIs
      • GetClientRect.USER32(?,?), ref: 004302E6
      • GetWindowRect.USER32(00000000,?), ref: 00430316
      • GetClientRect.USER32(?,?), ref: 00430364
      • GetSystemMetrics.USER32(0000000F), ref: 004303B1
      • GetWindowRect.USER32(?,?), ref: 004303C3
      • ScreenToClient.USER32(?,?), ref: 004303EC
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Rect$Client$Window$MetricsScreenSystem
      • String ID:
      • API String ID: 3220332590-0
      • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
      • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
      • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
      • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _malloc_wcslen$_strcat_wcscpy
      • String ID:
      • API String ID: 1612042205-0
      • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
      • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
      • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
      • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove_strncmp
      • String ID: >$U$\
      • API String ID: 2666721431-237099441
      • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
      • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
      • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
      • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
      APIs
      • GetKeyboardState.USER32(?), ref: 0044C570
      • SetKeyboardState.USER32(00000080), ref: 0044C594
      • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
      • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
      • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
      • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$InputSend
      • String ID:
      • API String ID: 2221674350-0
      • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
      • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
      • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
      • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcscpy$_wcscat
      • String ID:
      • API String ID: 2037614760-0
      • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
      • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
      • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
      • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
      APIs
      • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
      • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
      • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
      • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$Copy$AllocClearErrorLastString
      • String ID:
      • API String ID: 960795272-0
      • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
      • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
      • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
      • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
      APIs
      • BeginPaint.USER32(00000000,?), ref: 00447BDF
      • GetWindowRect.USER32(?,?), ref: 00447C5D
      • ScreenToClient.USER32(?,?), ref: 00447C7B
      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
      • EndPaint.USER32(?,?), ref: 00447D13
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
      • String ID:
      • API String ID: 4189319755-0
      • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
      • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
      • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
      • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
      APIs
      • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
      • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
      • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
      • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
      • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$LongWindow$InvalidateRect
      • String ID:
      • API String ID: 1976402638-0
      • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
      • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
      • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
      • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
      APIs
      • ShowWindow.USER32(?,00000000), ref: 00440A8A
      • EnableWindow.USER32(?,00000000), ref: 00440AAF
      • ShowWindow.USER32(?,00000000), ref: 00440B18
      • ShowWindow.USER32(?,00000004), ref: 00440B2B
      • EnableWindow.USER32(?,00000001), ref: 00440B50
      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Show$Enable$MessageSend
      • String ID:
      • API String ID: 642888154-0
      • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
      • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
      • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
      • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
      APIs
      • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Enable$Show$MessageSend
      • String ID:
      • API String ID: 1871949834-0
      • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
      • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
      • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
      • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
      • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
      • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
      • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
      APIs
      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
      • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
      • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
      • SendMessageW.USER32 ref: 00471AE3
      • DestroyIcon.USER32(?), ref: 00471AF4
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
      • String ID:
      • API String ID: 3611059338-0
      • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
      • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
      • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
      • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: DestroyWindow$DeleteObject$IconMove
      • String ID:
      • API String ID: 1640429340-0
      • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
      • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
      • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
      • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • _wcslen.LIBCMT ref: 004438CD
      • _wcslen.LIBCMT ref: 004438E6
      • _wcstok.LIBCMT ref: 004438F8
      • _wcslen.LIBCMT ref: 0044390C
      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
      • _wcstok.LIBCMT ref: 00443931
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
      • String ID:
      • API String ID: 3632110297-0
      • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
      • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
      • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
      • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Destroy$DeleteMenuObject$IconWindow
      • String ID:
      • API String ID: 752480666-0
      • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
      • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
      • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
      • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconImageList_
      • String ID:
      • API String ID: 3275902921-0
      • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
      • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
      • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
      • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconImageList_
      • String ID:
      • API String ID: 3275902921-0
      • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
      • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
      • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
      • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
      APIs
      • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: PerformanceQuery$CounterSleep$Frequency
      • String ID:
      • API String ID: 2833360925-0
      • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
      • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
      • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
      • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
      APIs
      • SendMessageW.USER32 ref: 004555C7
      • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: DeleteDestroyMessageObjectSend$IconWindow
      • String ID:
      • API String ID: 3691411573-0
      • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
      • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
      • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
      • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
      • LineTo.GDI32(?,?,?), ref: 004472AC
      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
      • LineTo.GDI32(?,?,?), ref: 004472C6
      • EndPath.GDI32(?), ref: 004472D6
      • StrokePath.GDI32(?), ref: 004472E4
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
      • String ID:
      • API String ID: 372113273-0
      • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
      • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
      • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
      • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
      APIs
      • GetDC.USER32(00000000), ref: 0044CC6D
      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
      • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CapsDevice$Release
      • String ID:
      • API String ID: 1035833867-0
      • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
      • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
      • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
      • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
      APIs
      • __getptd.LIBCMT ref: 0041708E
        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
      • __amsg_exit.LIBCMT ref: 004170AE
      • __lock.LIBCMT ref: 004170BE
      • InterlockedDecrement.KERNEL32(?), ref: 004170DB
      • _free.LIBCMT ref: 004170EE
      • InterlockedIncrement.KERNEL32(00952CE0), ref: 00417106
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
      • String ID:
      • API String ID: 3470314060-0
      • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
      • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
      • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
      • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
      APIs
      • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
      • EnterCriticalSection.KERNEL32(?), ref: 0044B666
      • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
      • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
        • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
      • String ID:
      • API String ID: 3495660284-0
      • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
      • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
      • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
      • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
      APIs
      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Virtual
      • String ID:
      • API String ID: 4278518827-0
      • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
      • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
      • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
      • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 004151C0
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 004151CB
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 004151DD
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
      • ExitThread.KERNEL32 ref: 004151ED
      • __freefls@4.LIBCMT ref: 00415209
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
      • String ID:
      • API String ID: 442100245-0
      • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
      • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
      • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
      • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
      • _wcslen.LIBCMT ref: 0045F94A
      • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
      • String ID: 0
      • API String ID: 621800784-4108050209
      • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
      • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
      • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
      • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SetErrorMode.KERNEL32 ref: 004781CE
      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • SetErrorMode.KERNEL32(?), ref: 00478270
      • SetErrorMode.KERNEL32(?), ref: 00478340
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$AttributesFile_memmove_wcslen
      • String ID: \VH
      • API String ID: 3884216118-234962358
      • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
      • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
      • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
      • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
      APIs
      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
      • IsMenu.USER32(?), ref: 0044854D
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
      • DrawMenuBar.USER32 ref: 004485AF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$Item$DrawInfoInsert
      • String ID: 0
      • API String ID: 3076010158-4108050209
      • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
      • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
      • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
      • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
      • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$_memmove_wcslen
      • String ID: ComboBox$ListBox
      • API String ID: 1589278365-1403004172
      • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
      • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
      • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
      • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Handle
      • String ID: nul
      • API String ID: 2519475695-2873401336
      • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
      • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
      • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
      • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
      APIs
      • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Handle
      • String ID: nul
      • API String ID: 2519475695-2873401336
      • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
      • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
      • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
      • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID: SysAnimate32
      • API String ID: 0-1011021900
      • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
      • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
      • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
      • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
        • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
        • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
        • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
        • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
      • GetFocus.USER32 ref: 0046157B
        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
      • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
      • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
      • __swprintf.LIBCMT ref: 00461608
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
      • String ID: %s%d
      • API String ID: 2645982514-1110647743
      • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
      • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
      • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
      • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
      • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
      • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
      • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
      APIs
      • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
      • CloseHandle.KERNEL32(00000000), ref: 00475A4D
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Process$CloseCountersCurrentHandleOpen
      • String ID:
      • API String ID: 3488606520-0
      • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
      • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
      • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
      • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ConnectRegistry_memmove_wcslen
      • String ID:
      • API String ID: 15295421-0
      • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
      • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
      • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
      • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
      APIs
      • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
      • GetProcAddress.KERNEL32(?,?), ref: 004648F7
      • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
      • GetProcAddress.KERNEL32(?,?), ref: 0046495A
      • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressProc$Library$FreeLoad
      • String ID:
      • API String ID: 2449869053-0
      • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
      • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
      • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
      • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
      APIs
      • GetCursorPos.USER32(?), ref: 004563A6
      • ScreenToClient.USER32(?,?), ref: 004563C3
      • GetAsyncKeyState.USER32(?), ref: 00456400
      • GetAsyncKeyState.USER32(?), ref: 00456410
      • GetWindowLongW.USER32(?,000000F0), ref: 00456466
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AsyncState$ClientCursorLongScreenWindow
      • String ID:
      • API String ID: 3539004672-0
      • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
      • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
      • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
      • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
      APIs
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
      • Sleep.KERNEL32(0000000A), ref: 0047D455
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Interlocked$DecrementIncrement$Sleep
      • String ID:
      • API String ID: 327565842-0
      • Opcode ID: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
      • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
      • Opcode Fuzzy Hash: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
      • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
      APIs
      • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
      • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
      • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
      • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: PrivateProfile$SectionWrite$String
      • String ID:
      • API String ID: 2832842796-0
      • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
      • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
      • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
      • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
      APIs
      • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
      • RegCloseKey.ADVAPI32(?), ref: 00441CFE
      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Enum$CloseDeleteOpen
      • String ID:
      • API String ID: 2095303065-0
      • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
      • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
      • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
      • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
      APIs
      • GetWindowRect.USER32(?,?), ref: 00436A24
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: RectWindow
      • String ID:
      • API String ID: 861336768-0
      • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
      • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
      • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
      • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
      APIs
      • SendMessageW.USER32 ref: 00449598
        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
      • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
      • _wcslen.LIBCMT ref: 0044960D
      • _wcslen.LIBCMT ref: 0044961A
      • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$_wcslen$_wcspbrk
      • String ID:
      • API String ID: 1856069659-0
      • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
      • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
      • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
      • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
      APIs
      • GetCursorPos.USER32(?), ref: 004478E2
      • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
      • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
      • GetCursorPos.USER32(00000000), ref: 0044796A
      • TrackPopupMenuEx.USER32(?,00000000,00000000,?,?,00000000), ref: 00447991
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CursorMenuPopupTrack$Proc
      • String ID:
      • API String ID: 1300944170-0
      • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
      • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
      • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
      • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
      APIs
      • GetClientRect.USER32(?,?), ref: 004479CC
      • GetCursorPos.USER32(?), ref: 004479D7
      • ScreenToClient.USER32(?,?), ref: 004479F3
      • WindowFromPoint.USER32(?,?), ref: 00447A34
      • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Client$CursorFromPointProcRectScreenWindow
      • String ID:
      • API String ID: 1822080540-0
      • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
      • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
      • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
      • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
      APIs
      • GetWindowRect.USER32(?,?), ref: 00447C5D
      • ScreenToClient.USER32(?,?), ref: 00447C7B
      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
      • EndPaint.USER32(?,?), ref: 00447D13
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ClientPaintRectRectangleScreenViewportWindow
      • String ID:
      • API String ID: 659298297-0
      • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
      • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
      • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
      • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
      APIs
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
        • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
        • Part of subcall function 00440D98: SendMessageW.USER32(00951AD8,000000F1,00000000,00000000), ref: 00440E6E
        • Part of subcall function 00440D98: SendMessageW.USER32(00951AD8,000000F1,00000001,00000000), ref: 00440E9A
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$EnableMessageSend$LongShow
      • String ID:
      • API String ID: 142311417-0
      • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
      • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
      • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
      • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
      • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
      • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
      • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
      APIs
      • IsWindowVisible.USER32(?), ref: 00445879
      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
      • _wcslen.LIBCMT ref: 004458FB
      • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
      • String ID:
      • API String ID: 3087257052-0
      • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
      • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
      • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
      • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
      APIs
        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
      • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
      • connect.WSOCK32(00000000,?,00000010), ref: 00465446
      • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
      • closesocket.WSOCK32(00000000,00000000), ref: 00465481
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorLast$closesocketconnectinet_addrsocket
      • String ID:
      • API String ID: 245547762-0
      • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
      • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
      • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
      • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
      APIs
      • DeleteObject.GDI32(00000000), ref: 004471D8
      • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • SelectObject.GDI32(?,00000000), ref: 00447228
      • BeginPath.GDI32(?), ref: 0044723D
      • SelectObject.GDI32(?,00000000), ref: 00447266
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Object$Select$BeginCreateDeletePath
      • String ID:
      • API String ID: 2338827641-0
      • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
      • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
      • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
      • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
      APIs
      • Sleep.KERNEL32(00000000), ref: 00434598
      • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
      • Sleep.KERNEL32(00000000), ref: 004345D4
      • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CounterPerformanceQuerySleep
      • String ID:
      • API String ID: 2875609808-0
      • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
      • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
      • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
      • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
      APIs
      • GetDlgItem.USER32(?,000003E9), ref: 00460C17
      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
      • MessageBeep.USER32(00000000), ref: 00460C46
      • KillTimer.USER32(?,0000040A), ref: 00460C68
      • EndDialog.USER32(?,00000001), ref: 00460C83
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: BeepDialogItemKillMessageTextTimerWindow
      • String ID:
      • API String ID: 3741023627-0
      • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
      • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
      • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
      • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$Icon
      • String ID:
      • API String ID: 4023252218-0
      • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
      • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
      • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
      • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
      APIs
      • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: DeleteDestroyObject$IconMessageSendWindow
      • String ID:
      • API String ID: 1489400265-0
      • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
      • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
      • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
      • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
      APIs
        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
      • DestroyWindow.USER32(?), ref: 00455728
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
      • String ID:
      • API String ID: 1042038666-0
      • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
      • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
      • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
      • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Path$ObjectStroke$DeleteFillSelect
      • String ID:
      • API String ID: 2625713937-0
      • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
      • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
      • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
      • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
      APIs
      • __getptd.LIBCMT ref: 0041780F
        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
      • __getptd.LIBCMT ref: 00417826
      • __amsg_exit.LIBCMT ref: 00417834
      • __lock.LIBCMT ref: 00417844
      • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
      • String ID:
      • API String ID: 938513278-0
      • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
      • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
      • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
      • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
      APIs
        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
      • ___set_flsgetvalue.LIBCMT ref: 00413D20
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
      • ExitThread.KERNEL32 ref: 00413D4E
      • GetCurrentThreadId.KERNEL32 ref: 00413D54
      • __freefls@4.LIBCMT ref: 00413D74
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
      • String ID:
      • API String ID: 2403457894-0
      • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
      • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
      • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
      • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
      APIs
        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
      • ___set_flsgetvalue.LIBCMT ref: 004151C0
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 004151CB
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 004151DD
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
      • ExitThread.KERNEL32 ref: 004151ED
      • __freefls@4.LIBCMT ref: 00415209
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
      • String ID:
      • API String ID: 4247068974-0
      • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
      • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
      • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
      • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID:
      • String ID: )$U$\
      • API String ID: 0-3705770531
      • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
      • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
      • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
      • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
      APIs
        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
      • CoInitialize.OLE32(00000000), ref: 0046E505
      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
      • CoUninitialize.OLE32 ref: 0046E53D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize_wcslen
      • String ID: .lnk
      • API String ID: 886957087-24824748
      • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
      • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
      • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
      • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
      • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
      • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
      • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
      • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
      • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
      • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
      • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
      • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
      • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
      Strings
      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
      • API String ID: 708495834-557222456
      • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
      • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
      • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
      • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
      APIs
        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
      • CoInitialize.OLE32(00000000), ref: 00478442
      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
      • CoUninitialize.OLE32 ref: 0047863C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize_wcslen
      • String ID: .lnk
      • API String ID: 886957087-24824748
      • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
      • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
      • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
      • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
      APIs
        • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
        • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
        • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
        • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
        • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
      • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
      • String ID: @
      • API String ID: 4150878124-2766056989
      • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
      • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
      • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
      • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \$]$h
      • API String ID: 4104443479-3262404753
      • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
      • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
      • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
      • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
      APIs
      • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • CloseHandle.KERNEL32(?), ref: 00457E09
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CloseExecuteHandleShell_wcscpy_wcslen
      • String ID: <$@
      • API String ID: 2417854910-1426351568
      • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
      • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
      • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
      • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
      APIs
      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
      • String ID:
      • API String ID: 3705125965-3916222277
      • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
      • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
      • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
      • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
      APIs
      • GetMenuItemInfoW.USER32 ref: 0045FAC4
      • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
      • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$Delete$InfoItem
      • String ID: 0
      • API String ID: 135850232-4108050209
      • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
      • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
      • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
      • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
      APIs
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
      • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Long
      • String ID: SysTreeView32
      • API String ID: 847901565-1698111956
      • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
      • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
      • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
      • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
      APIs
      • LoadLibraryA.KERNEL32(?), ref: 00434B10
      • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
      • FreeLibrary.KERNEL32(?), ref: 00434B9F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Library$AddressFreeLoadProc
      • String ID: AU3_GetPluginDetails
      • API String ID: 145871493-4132174516
      • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
      • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
      • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
      • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
      APIs
      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$Window
      • String ID: SysMonthCal32
      • API String ID: 2326795674-1439706946
      • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
      • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
      • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
      • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
      APIs
      • DestroyWindow.USER32(00000000), ref: 00450A2F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: DestroyWindow
      • String ID: msctls_updown32
      • API String ID: 3375834691-2298589950
      • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
      • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
      • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
      • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: $<
      • API String ID: 4104443479-428540627
      • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
      • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
      • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
      • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
      • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
      • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
      • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
      • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
      • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
      • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
      • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
      • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
      • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume
      • String ID: \VH
      • API String ID: 2507767853-234962358
      • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
      • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
      • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
      • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume
      • String ID: \VH
      • API String ID: 2507767853-234962358
      • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
      • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
      • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
      • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
      APIs
      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
      • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: msctls_trackbar32
      • API String ID: 3850602802-1010561917
      • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
      • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
      • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
      • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • CLSIDFromString.OLE32(?,00000000), ref: 00435236
      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
      • String ID: crts
      • API String ID: 943502515-3724388283
      • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
      • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
      • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
      • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
      • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
      • SetErrorMode.KERNEL32(?), ref: 0045D35C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorMode$LabelVolume
      • String ID: \VH
      • API String ID: 2006950084-234962358
      • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
      • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
      • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
      • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetMenuItemInfoW.USER32 ref: 00449727
      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
      • DrawMenuBar.USER32 ref: 00449761
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Menu$InfoItem$Draw_malloc
      • String ID: 0
      • API String ID: 772068139-4108050209
      • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
      • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
      • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
      • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$_wcscpy
      • String ID: 3, 3, 8, 1
      • API String ID: 3469035223-357260408
      • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
      • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
      • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
      • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
      • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpCloseHandle
      • API String ID: 2574300362-3530519716
      • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
      • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
      • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
      • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
      • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpCreateFile
      • API String ID: 2574300362-275556492
      • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
      • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
      • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
      • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
      • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpSendEcho
      • API String ID: 2574300362-58917771
      • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
      • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
      • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
      • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
      APIs
      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: RegDeleteKeyExW$advapi32.dll
      • API String ID: 2574300362-4033151799
      • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
      • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
      • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
      • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
      APIs
      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: GetSystemWow64DirectoryW$kernel32.dll
      • API String ID: 2574300362-1816364905
      • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
      • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
      • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
      • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
      APIs
      • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
      • __itow.LIBCMT ref: 004699CD
        • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
      • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
      • __itow.LIBCMT ref: 00469A97
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$__itow
      • String ID:
      • API String ID: 3379773720-0
      • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
      • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
      • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
      • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
      APIs
      • GetWindowRect.USER32(?,?), ref: 00449A4A
      • ScreenToClient.USER32(?,?), ref: 00449A80
      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$ClientMoveRectScreen
      • String ID:
      • API String ID: 3880355969-0
      • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
      • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
      • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
      • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
      • String ID:
      • API String ID: 2782032738-0
      • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
      • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
      • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
      • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
      APIs
      • ClientToScreen.USER32(00000000,?), ref: 0044169A
      • GetWindowRect.USER32(?,?), ref: 00441722
      • PtInRect.USER32(?,?,?), ref: 00441734
      • MessageBeep.USER32(00000000), ref: 004417AD
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Rect$BeepClientMessageScreenWindow
      • String ID:
      • API String ID: 1352109105-0
      • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
      • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
      • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
      • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
      APIs
      • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
      • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
      • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
      • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CreateHardLink$DeleteErrorFileLast
      • String ID:
      • API String ID: 3321077145-0
      • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
      • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
      • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
      • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
      APIs
      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
      • __isleadbyte_l.LIBCMT ref: 004208A6
      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
      • String ID:
      • API String ID: 3058430110-0
      • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
      • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
      • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
      • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
      APIs
      • GetParent.USER32(?), ref: 004503C8
      • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
      • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
      • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Proc$Parent
      • String ID:
      • API String ID: 2351499541-0
      • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
      • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
      • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
      • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
      APIs
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
      • TranslateMessage.USER32(?), ref: 00442B01
      • DispatchMessageW.USER32(?), ref: 00442B0B
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Message$Peek$DispatchTranslate
      • String ID:
      • API String ID: 1795658109-0
      • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
      • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
      • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
      • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
      APIs
      • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
      • GetCaretPos.USER32(?), ref: 004743B2
      • ClientToScreen.USER32(00000000,?), ref: 004743E8
      • GetForegroundWindow.USER32 ref: 004743EE
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
      • String ID:
      • API String ID: 2759813231-0
      • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
      • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
      • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
      • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
      APIs
        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
      • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
      • _wcslen.LIBCMT ref: 00449519
      • _wcslen.LIBCMT ref: 00449526
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend_wcslen$_wcspbrk
      • String ID:
      • API String ID: 2886238975-0
      • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
      • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
      • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
      • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __setmode$DebugOutputString_fprintf
      • String ID:
      • API String ID: 1792727568-0
      • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
      • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
      • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
      • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
      APIs
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$Long$AttributesLayered
      • String ID:
      • API String ID: 2169480361-0
      • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
      • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
      • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
      • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
      APIs
        • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
        • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
        • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
      • lstrlenW.KERNEL32(?), ref: 00434CF6
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
      • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: lstrcmpilstrcpylstrlen$_malloc
      • String ID: cdecl
      • API String ID: 3850814276-3896280584
      • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
      • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
      • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
      • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
      APIs
        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
      • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
      • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
      • _memmove.LIBCMT ref: 0046D475
      • inet_ntoa.WSOCK32(?), ref: 0046D481
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
      • String ID:
      • API String ID: 2502553879-0
      • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
      • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
      • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
      • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
      APIs
      • SendMessageW.USER32 ref: 00448C69
      • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
      • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
      • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend$LongWindow
      • String ID:
      • API String ID: 312131281-0
      • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
      • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
      • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
      • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
      APIs
      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
      • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
      • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
      • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorLastacceptselect
      • String ID:
      • API String ID: 385091864-0
      • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
      • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
      • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
      • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
      APIs
      • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
      • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
      • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
      • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
      APIs
      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
      • GetStockObject.GDI32(00000011), ref: 00430258
      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
      • ShowWindow.USER32(00000000,00000000), ref: 0043027D
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Window$CreateMessageObjectSendShowStock
      • String ID:
      • API String ID: 1358664141-0
      • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
      • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
      • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
      • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
      APIs
      • GetCurrentThreadId.KERNEL32 ref: 00443CA6
      • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
      • CloseHandle.KERNEL32(00000000), ref: 00443CF9
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
      • String ID:
      • API String ID: 2880819207-0
      • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
      • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
      • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
      • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
      APIs
      • GetWindowRect.USER32(?,?), ref: 00430BA2
      • ScreenToClient.USER32(?,?), ref: 00430BC1
      • ScreenToClient.USER32(?,?), ref: 00430BE2
      • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ClientRectScreen$InvalidateWindow
      • String ID:
      • API String ID: 357397906-0
      • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
      • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
      • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
      • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
      APIs
      • __wsplitpath.LIBCMT ref: 0043392E
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • __wsplitpath.LIBCMT ref: 00433950
      • __wcsicoll.LIBCMT ref: 00433974
      • __wcsicoll.LIBCMT ref: 0043398A
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
      • String ID:
      • API String ID: 1187119602-0
      • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
      • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
      • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
      • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcslen$_malloc_wcscat_wcscpy
      • String ID:
      • API String ID: 1597257046-0
      • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
      • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
      • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
      • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
      APIs
      • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
      • __malloc_crt.LIBCMT ref: 0041F5B6
      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: EnvironmentStrings$Free__malloc_crt
      • String ID:
      • API String ID: 237123855-0
      • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
      • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
      • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
      • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: DeleteDestroyObject$IconWindow
      • String ID:
      • API String ID: 3349847261-0
      • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
      • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
      • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
      • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
      APIs
      • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
      • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CriticalSection$Leave$EnterExchangeInterlocked
      • String ID:
      • API String ID: 2223660684-0
      • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
      • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
      • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
      • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
      • LineTo.GDI32(?,?,?), ref: 00447326
      • EndPath.GDI32(?), ref: 00447336
      • StrokePath.GDI32(?), ref: 00447344
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
      • String ID:
      • API String ID: 2783949968-0
      • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
      • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
      • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
      • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
      APIs
      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
      • GetCurrentThreadId.KERNEL32 ref: 004364A3
      • AttachThreadInput.USER32(00000000), ref: 004364AA
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
      • String ID:
      • API String ID: 2710830443-0
      • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
      • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
      • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
      • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
      APIs
      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
      • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
        • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
        • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
      • String ID:
      • API String ID: 146765662-0
      • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
      • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
      • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
      • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
      APIs
      • GetDesktopWindow.USER32 ref: 00472B63
      • GetDC.USER32(00000000), ref: 00472B6C
      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
      • ReleaseDC.USER32(00000000,?), ref: 00472B99
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
      • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
      • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
      • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
      APIs
      • GetDesktopWindow.USER32 ref: 00472BB2
      • GetDC.USER32(00000000), ref: 00472BBB
      • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
      • ReleaseDC.USER32(00000000,?), ref: 00472BE8
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
      • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
      • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
      • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
      APIs
      • __getptd_noexit.LIBCMT ref: 00415150
        • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
        • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
        • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
        • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
        • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
      • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
      • __freeptd.LIBCMT ref: 0041516B
      • ExitThread.KERNEL32 ref: 00415173
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
      • String ID:
      • API String ID: 1454798553-0
      • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
      • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
      • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
      • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _strncmp
      • String ID: Q\E
      • API String ID: 909875538-2189900498
      • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
      • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
      • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
      • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
      APIs
      • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
        • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
      • String ID: AutoIt3GUI$Container
      • API String ID: 2652923123-3941886329
      • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
      • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
      • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
      • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove_strncmp
      • String ID: U$\
      • API String ID: 2666721431-100911408
      • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
      • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
      • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
      • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • __wcsnicmp.LIBCMT ref: 00467288
      • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Connection__wcsnicmp_wcscpy_wcslen
      • String ID: LPT
      • API String ID: 3035604524-1350329615
      • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
      • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
      • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
      • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \$h
      • API String ID: 4104443479-677774858
      • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
      • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
      • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
      • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memcmp
      • String ID: &
      • API String ID: 2931989736-1010288
      • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
      • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
      • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
      • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
      • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
      • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
      • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
      APIs
      • _wcslen.LIBCMT ref: 00466825
      • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CrackInternet_wcslen
      • String ID: |
      • API String ID: 596671847-2343686810
      • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
      • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
      • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
      • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
      APIs
      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: '
      • API String ID: 3850602802-1997036262
      • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
      • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
      • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
      • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
      APIs
      • _strlen.LIBCMT ref: 0040F858
        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
      • _sprintf.LIBCMT ref: 0040F9AE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove$_sprintf_strlen
      • String ID: %02X
      • API String ID: 1921645428-436463671
      • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
      • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
      • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
      • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
      APIs
      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: Combobox
      • API String ID: 3850602802-2096851135
      • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
      • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
      • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
      • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
      APIs
      • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: LengthMessageSendTextWindow
      • String ID: edit
      • API String ID: 2978978980-2167791130
      • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
      • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
      • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
      • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
      APIs
      • Sleep.KERNEL32(00000000), ref: 00476CB0
      • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: GlobalMemorySleepStatus
      • String ID: @
      • API String ID: 2783356886-2766056989
      • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
      • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
      • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
      • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: htonsinet_addr
      • String ID: 255.255.255.255
      • API String ID: 3832099526-2422070025
      • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
      • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
      • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
      • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
      APIs
      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: InternetOpen
      • String ID: <local>
      • API String ID: 2038078732-4266983199
      • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
      • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
      • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
      • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: __fread_nolock_memmove
      • String ID: EA06
      • API String ID: 1988441806-3962188686
      • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
      • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
      • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
      • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _memmove
      • String ID: u,D
      • API String ID: 4104443479-3858472334
      • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
      • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
      • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
      • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
      APIs
      • _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _memmove.LIBCMT ref: 00401B57
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
      • String ID: @EXITCODE
      • API String ID: 2734553683-3436989551
      • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
      • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
      • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
      • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
      APIs
      • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • wsprintfW.USER32 ref: 0045612A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: MessageSend_mallocwsprintf
      • String ID: %d/%02d/%02d
      • API String ID: 1262938277-328681919
      • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
      • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
      • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
      • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
      APIs
      • InternetCloseHandle.WININET(?), ref: 00442663
      • InternetCloseHandle.WININET ref: 00442668
        • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: CloseHandleInternet$ObjectSingleWait
      • String ID: aeB
      • API String ID: 857135153-906807131
      • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
      • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
      • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
      • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
      APIs
      Strings
      • ^B, xrefs: 00433248
      • C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe, xrefs: 0043324B
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: _wcsncpy
      • String ID: ^B$C:\Users\user\Desktop\Fedex Express Invoice 09004106.exe
      • API String ID: 1735881322-49697412
      • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
      • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
      • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
      • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
      APIs
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
      • PostMessageW.USER32(00000000), ref: 00441C05
        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: FindMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 529655941-2988720461
      • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
      • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
      • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
      • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
      APIs
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: FindMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 529655941-2988720461
      • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
      • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
      • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
      • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
      APIs
      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
        • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1507760704.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1507748160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507814174.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507834975.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507849198.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1507863437.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1508010936.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Fedex Express Invoice 09004106.jbxd
      Similarity
      • API ID: Message_doexit
      • String ID: AutoIt$Error allocating memory.
      • API String ID: 1993061046-4017498283
      • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
      • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
      • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
      • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D