Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z1PURCHASEORDER.exe

Overview

General Information

Sample name:z1PURCHASEORDER.exe
Analysis ID:1528899
MD5:c4224dd3cd6d013992c9680812a7f946
SHA1:753a273f0864ebeebbb05fab9767e714b31edd1c
SHA256:4fd906a04bf473c85deb5f4689c592b97e0ec46c747ff130bec022956369f59d
Tags:exeuser-Porcupine
Infos:

Detection

FormBook
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • z1PURCHASEORDER.exe (PID: 6012 cmdline: "C:\Users\user\Desktop\z1PURCHASEORDER.exe" MD5: C4224DD3CD6D013992C9680812A7F946)
    • svchost.exe (PID: 4992 cmdline: "C:\Users\user\Desktop\z1PURCHASEORDER.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2c290:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x1434f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2f5e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x176a2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e7e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x168a2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2f5e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x176a2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", CommandLine: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", ParentImage: C:\Users\user\Desktop\z1PURCHASEORDER.exe, ParentProcessId: 6012, ParentProcessName: z1PURCHASEORDER.exe, ProcessCommandLine: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", ProcessId: 4992, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", CommandLine: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", ParentImage: C:\Users\user\Desktop\z1PURCHASEORDER.exe, ParentProcessId: 6012, ParentProcessName: z1PURCHASEORDER.exe, ProcessCommandLine: "C:\Users\user\Desktop\z1PURCHASEORDER.exe", ProcessId: 4992, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: z1PURCHASEORDER.exeReversingLabs: Detection: 28%
          Source: z1PURCHASEORDER.exeVirustotal: Detection: 24%Perma Link
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: z1PURCHASEORDER.exeJoe Sandbox ML: detected
          Source: z1PURCHASEORDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: z1PURCHASEORDER.exe, 00000000.00000003.1439671739.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, z1PURCHASEORDER.exe, 00000000.00000003.1440282428.0000000003A50000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1669510794.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1667683558.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: z1PURCHASEORDER.exe, 00000000.00000003.1439671739.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, z1PURCHASEORDER.exe, 00000000.00000003.1440282428.0000000003A50000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1669510794.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1667683558.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_0073449B
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073C75D FindFirstFileW,FindClose,0_2_0073C75D
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0073C7E8
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0073F021
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0073F17E
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0073F47F
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00733833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00733833
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00733B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00733B56
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0073BD48
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00742404 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00742404
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0074407C
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0074427A
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0074407C
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073003A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0073003A
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0075CB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0075CB26

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: This is a third-party compiled AutoIt script.0_2_006D3B4C
          Source: z1PURCHASEORDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: z1PURCHASEORDER.exe, 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c90ea749-5
          Source: z1PURCHASEORDER.exe, 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_1bbc829e-a
          Source: z1PURCHASEORDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5b924b7a-6
          Source: z1PURCHASEORDER.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_af62209a-9
          Source: initial sampleStatic PE information: Filename: z1PURCHASEORDER.exe
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C8A3 NtClose,2_2_0042C8A3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972B60 NtClose,LdrInitializeThunk,2_2_03972B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03972DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039735C0 NtCreateMutant,LdrInitializeThunk,2_2_039735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03974340 NtSetContextThread,2_2_03974340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03974650 NtSuspendThread,2_2_03974650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972B80 NtQueryInformationFile,2_2_03972B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BA0 NtEnumerateValueKey,2_2_03972BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BF0 NtAllocateVirtualMemory,2_2_03972BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BE0 NtQueryValueKey,2_2_03972BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AB0 NtWaitForSingleObject,2_2_03972AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AD0 NtReadFile,2_2_03972AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AF0 NtWriteFile,2_2_03972AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F90 NtProtectVirtualMemory,2_2_03972F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FB0 NtResumeThread,2_2_03972FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FA0 NtQuerySection,2_2_03972FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FE0 NtCreateFile,2_2_03972FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F30 NtCreateSection,2_2_03972F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F60 NtCreateProcessEx,2_2_03972F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972E80 NtReadVirtualMemory,2_2_03972E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972EA0 NtAdjustPrivilegesToken,2_2_03972EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972EE0 NtQueueApcThread,2_2_03972EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972E30 NtWriteVirtualMemory,2_2_03972E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DB0 NtEnumerateKey,2_2_03972DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DD0 NtDelayExecution,2_2_03972DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D10 NtMapViewOfSection,2_2_03972D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D00 NtSetInformationFile,2_2_03972D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D30 NtUnmapViewOfSection,2_2_03972D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CA0 NtQueryInformationToken,2_2_03972CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CC0 NtQueryVirtualMemory,2_2_03972CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CF0 NtOpenProcess,2_2_03972CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C00 NtQueryInformationProcess,2_2_03972C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C70 NtFreeVirtualMemory,2_2_03972C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C60 NtCreateKey,2_2_03972C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973090 NtSetValueKey,2_2_03973090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973010 NtOpenDirectoryObject,2_2_03973010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039739B0 NtGetContextThread,2_2_039739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973D10 NtOpenProcessToken,2_2_03973D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973D70 NtOpenThread,2_2_03973D70
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073A279: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0073A279
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00728638 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00728638
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00735264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00735264
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006DE8000_2_006DE800
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006FDAF50_2_006FDAF5
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006DFE400_2_006DFE40
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006DE0600_2_006DE060
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E41400_2_006E4140
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F23450_2_006F2345
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007504650_2_00750465
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007064520_2_00706452
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007025AE0_2_007025AE
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F277A0_2_006F277A
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E68410_2_006E6841
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007508E20_2_007508E2
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E89680_2_006E8968
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007389320_2_00738932
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0072E9280_2_0072E928
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0070890F0_2_0070890F
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007069C40_2_007069C4
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006FCCA10_2_006FCCA1
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00706F360_2_00706F36
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E70FE0_2_006E70FE
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E31900_2_006E3190
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D12870_2_006D1287
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006FF3590_2_006FF359
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F33070_2_006F3307
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F16040_2_006F1604
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E56800_2_006E5680
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F78130_2_006F7813
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E58C00_2_006E58C0
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F1AF80_2_006F1AF8
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00709C350_2_00709C35
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00757E0D0_2_00757E0D
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006FBF260_2_006FBF26
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F1F100_2_006F1F10
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0138C6480_2_0138C648
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100CC2_2_004100CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100D32_2_004100D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030E02_2_004030E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040212C2_2_0040212C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004021302_2_00402130
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416A132_2_00416A13
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004102F32_2_004102F3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022B02_2_004022B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E3732_2_0040E373
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004026402_2_00402640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EED32_2_0042EED3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A003E62_2_03A003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F02_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA3522_2_039FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C02C02_2_039C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E02742_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A001AA2_2_03A001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F41A22_2_039F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F81CC2_2_039F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA1182_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039301002_2_03930100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C81582_2_039C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D20002_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393C7C02_2_0393C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039647502_2_03964750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039407702_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395C6E02_2_0395C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A005912_2_03A00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039405352_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EE4F62_2_039EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E44202_2_039E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F24462_2_039F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F6BD72_2_039F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FAB402_2_039FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA802_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0A9A62_2_03A0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A02_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039569622_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039268B82_2_039268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E8F02_2_0396E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394A8402_2_0394A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039428402_2_03942840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BEFA02_2_039BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932FC82_2_03932FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394CFE02_2_0394CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960F302_2_03960F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E2F302_2_039E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03982F282_2_03982F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4F402_2_039B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952E902_2_03952E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FCE932_2_039FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FEEDB2_2_039FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393AE0D2_2_0393AE0D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FEE262_2_039FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940E592_2_03940E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03958DBF2_2_03958DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DCD1F2_2_039DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394AD002_2_0394AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0CB52_2_039E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930CF22_2_03930CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940C002_2_03940C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0398739A2_2_0398739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F132D2_2_039F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392D34C2_2_0392D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039452A02_2_039452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395B2C02_2_0395B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E12ED2_2_039E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394B1B02_2_0394B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0B16B2_2_03A0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392F1722_2_0392F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397516C2_2_0397516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EF0CC2_2_039EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039470C02_2_039470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F70E92_2_039F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF0E02_2_039FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF7B02_2_039FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F16CC2_2_039F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039856302_2_03985630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DD5B02_2_039DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A095C32_2_03A095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F75712_2_039F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF43F2_2_039FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039314602_2_03931460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395FB802_2_0395FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B5BF02_2_039B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397DBF92_2_0397DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFB762_2_039FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DDAAC2_2_039DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03985AA02_2_03985AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E1AA32_2_039E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EDAC62_2_039EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFA492_2_039FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F7A462_2_039F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B3A6C2_2_039B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D59102_2_039D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039499502_2_03949950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395B9502_2_0395B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039438E02_2_039438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AD8002_2_039AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03941F922_2_03941F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFFB12_2_039FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03903FD22_2_03903FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03903FD52_2_03903FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFF092_2_039FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03949EB02_2_03949EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395FDC02_2_0395FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F1D5A2_2_039F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03943D402_2_03943D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F7D732_2_039F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFCF22_2_039FFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B9C322_2_039B9C32
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: String function: 006D7F41 appears 35 times
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: String function: 006F0C63 appears 70 times
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: String function: 006F8A80 appears 42 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039BF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0392B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03975130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03987E54 appears 111 times
          Source: z1PURCHASEORDER.exe, 00000000.00000003.1441132568.00000000039D3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1PURCHASEORDER.exe
          Source: z1PURCHASEORDER.exe, 00000000.00000003.1441470231.0000000003B7D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1PURCHASEORDER.exe
          Source: z1PURCHASEORDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal92.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073A0F4 GetLastError,FormatMessageW,0_2_0073A0F4
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007284F3 AdjustTokenPrivileges,CloseHandle,0_2_007284F3
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00728AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00728AA3
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073B3BF SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0073B3BF
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074EF21 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0074EF21
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073C423 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0073C423
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_006D4FE9
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeFile created: C:\Users\user\AppData\Local\Temp\aut2D22.tmpJump to behavior
          Source: z1PURCHASEORDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: z1PURCHASEORDER.exeReversingLabs: Detection: 28%
          Source: z1PURCHASEORDER.exeVirustotal: Detection: 24%
          Source: unknownProcess created: C:\Users\user\Desktop\z1PURCHASEORDER.exe "C:\Users\user\Desktop\z1PURCHASEORDER.exe"
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\z1PURCHASEORDER.exe"
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\z1PURCHASEORDER.exe"Jump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: ntmarta.dllJump to behavior
          Source: z1PURCHASEORDER.exeStatic file information: File size 1199104 > 1048576
          Source: z1PURCHASEORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: z1PURCHASEORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: z1PURCHASEORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: z1PURCHASEORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: z1PURCHASEORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: z1PURCHASEORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: z1PURCHASEORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: z1PURCHASEORDER.exe, 00000000.00000003.1439671739.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, z1PURCHASEORDER.exe, 00000000.00000003.1440282428.0000000003A50000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1669510794.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1667683558.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: z1PURCHASEORDER.exe, 00000000.00000003.1439671739.00000000038B0000.00000004.00001000.00020000.00000000.sdmp, z1PURCHASEORDER.exe, 00000000.00000003.1440282428.0000000003A50000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1669510794.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1667683558.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1701067104.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: z1PURCHASEORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: z1PURCHASEORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: z1PURCHASEORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: z1PURCHASEORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: z1PURCHASEORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074C104 LoadLibraryA,GetProcAddress,0_2_0074C104
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F8AC5 push ecx; ret 0_2_006F8AD8
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006E5524 push dword ptr [ecx+00h]; retf 0_2_006E552C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040203F push eax; retf 2_2_00402049
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004170E9 push esp; ret 2_2_004170EC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00411A00 push ss; ret 2_2_00411A1A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403350 push eax; ret 2_2_00403352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040ABBD push ebx; iretd 2_2_0040ABC4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00412408 push edi; retf 2_2_0041241F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00412413 push edi; retf 2_2_0041241F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D4D4 pushad ; ret 2_2_0040D4FE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D626 push ebp; retf 2_2_0040D62A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D631 push eax; iretd 2_2_0040D656
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D63D push eax; iretd 2_2_0040D656
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004086A4 push esp; retf 2_2_004086B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00423F23 push esi; retf 2_2_00423F2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390225F pushad ; ret 2_2_039027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039027FA pushad ; ret 2_2_039027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD push ecx; mov dword ptr [esp], ecx2_2_039309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390283D push eax; iretd 2_2_03902858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03901368 push eax; iretd 2_2_03901369
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006D4A35
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007553DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007553DF
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F3307 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006F3307
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeAPI/Special instruction interceptor: Address: 138C26C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E rdtsc 2_2_0397096E
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-98678
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeAPI coverage: 4.4 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 5612Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_0073449B
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073C75D FindFirstFileW,FindClose,0_2_0073C75D
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0073C7E8
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0073F021
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0073F17E
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0073F47F
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00733833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00733833
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00733B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00733B56
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0073BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0073BD48
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006D4AFE
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeAPI call chain: ExitProcess graph end nodegraph_0-97504
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E rdtsc 2_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004179C3 LdrLoadDll,2_2_004179C3
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074401F BlockInput,0_2_0074401F
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006D3B4C
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00705BFC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00705BFC
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074C104 LoadLibraryA,GetProcAddress,0_2_0074C104
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0138C538 mov eax, dword ptr fs:[00000030h]0_2_0138C538
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0138C4D8 mov eax, dword ptr fs:[00000030h]0_2_0138C4D8
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0138AEA8 mov eax, dword ptr fs:[00000030h]0_2_0138AEA8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395438F mov eax, dword ptr fs:[00000030h]2_2_0395438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395438F mov eax, dword ptr fs:[00000030h]2_2_0395438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov ecx, dword ptr fs:[00000030h]2_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D43D4 mov eax, dword ptr fs:[00000030h]2_2_039D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D43D4 mov eax, dword ptr fs:[00000030h]2_2_039D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC3CD mov eax, dword ptr fs:[00000030h]2_2_039EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B63C0 mov eax, dword ptr fs:[00000030h]2_2_039B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039663FF mov eax, dword ptr fs:[00000030h]2_2_039663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C310 mov ecx, dword ptr fs:[00000030h]2_2_0392C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov eax, dword ptr fs:[00000030h]2_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov ecx, dword ptr fs:[00000030h]2_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov eax, dword ptr fs:[00000030h]2_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov eax, dword ptr fs:[00000030h]2_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950310 mov ecx, dword ptr fs:[00000030h]2_2_03950310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov ecx, dword ptr fs:[00000030h]2_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA352 mov eax, dword ptr fs:[00000030h]2_2_039FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D8350 mov ecx, dword ptr fs:[00000030h]2_2_039D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D437C mov eax, dword ptr fs:[00000030h]2_2_039D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0634F mov eax, dword ptr fs:[00000030h]2_2_03A0634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E284 mov eax, dword ptr fs:[00000030h]2_2_0396E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E284 mov eax, dword ptr fs:[00000030h]2_2_0396E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402A0 mov eax, dword ptr fs:[00000030h]2_2_039402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402A0 mov eax, dword ptr fs:[00000030h]2_2_039402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov ecx, dword ptr fs:[00000030h]2_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A062D6 mov eax, dword ptr fs:[00000030h]2_2_03A062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392823B mov eax, dword ptr fs:[00000030h]2_2_0392823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A250 mov eax, dword ptr fs:[00000030h]2_2_0392A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936259 mov eax, dword ptr fs:[00000030h]2_2_03936259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA250 mov eax, dword ptr fs:[00000030h]2_2_039EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA250 mov eax, dword ptr fs:[00000030h]2_2_039EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B8243 mov eax, dword ptr fs:[00000030h]2_2_039B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B8243 mov ecx, dword ptr fs:[00000030h]2_2_039B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392826B mov eax, dword ptr fs:[00000030h]2_2_0392826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0625D mov eax, dword ptr fs:[00000030h]2_2_03A0625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03970185 mov eax, dword ptr fs:[00000030h]2_2_03970185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC188 mov eax, dword ptr fs:[00000030h]2_2_039EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC188 mov eax, dword ptr fs:[00000030h]2_2_039EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4180 mov eax, dword ptr fs:[00000030h]2_2_039D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4180 mov eax, dword ptr fs:[00000030h]2_2_039D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A061E5 mov eax, dword ptr fs:[00000030h]2_2_03A061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F61C3 mov eax, dword ptr fs:[00000030h]2_2_039F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F61C3 mov eax, dword ptr fs:[00000030h]2_2_039F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039601F8 mov eax, dword ptr fs:[00000030h]2_2_039601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov ecx, dword ptr fs:[00000030h]2_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F0115 mov eax, dword ptr fs:[00000030h]2_2_039F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960124 mov eax, dword ptr fs:[00000030h]2_2_03960124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C156 mov eax, dword ptr fs:[00000030h]2_2_0392C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C8158 mov eax, dword ptr fs:[00000030h]2_2_039C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04164 mov eax, dword ptr fs:[00000030h]2_2_03A04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04164 mov eax, dword ptr fs:[00000030h]2_2_03A04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936154 mov eax, dword ptr fs:[00000030h]2_2_03936154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936154 mov eax, dword ptr fs:[00000030h]2_2_03936154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov ecx, dword ptr fs:[00000030h]2_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393208A mov eax, dword ptr fs:[00000030h]2_2_0393208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F60B8 mov eax, dword ptr fs:[00000030h]2_2_039F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F60B8 mov ecx, dword ptr fs:[00000030h]2_2_039F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039280A0 mov eax, dword ptr fs:[00000030h]2_2_039280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C80A8 mov eax, dword ptr fs:[00000030h]2_2_039C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B20DE mov eax, dword ptr fs:[00000030h]2_2_039B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C0F0 mov eax, dword ptr fs:[00000030h]2_2_0392C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039720F0 mov ecx, dword ptr fs:[00000030h]2_2_039720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0392A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039380E9 mov eax, dword ptr fs:[00000030h]2_2_039380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B60E0 mov eax, dword ptr fs:[00000030h]2_2_039B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4000 mov ecx, dword ptr fs:[00000030h]2_2_039B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6030 mov eax, dword ptr fs:[00000030h]2_2_039C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A020 mov eax, dword ptr fs:[00000030h]2_2_0392A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C020 mov eax, dword ptr fs:[00000030h]2_2_0392C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932050 mov eax, dword ptr fs:[00000030h]2_2_03932050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6050 mov eax, dword ptr fs:[00000030h]2_2_039B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395C073 mov eax, dword ptr fs:[00000030h]2_2_0395C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D678E mov eax, dword ptr fs:[00000030h]2_2_039D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039307AF mov eax, dword ptr fs:[00000030h]2_2_039307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E47A0 mov eax, dword ptr fs:[00000030h]2_2_039E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393C7C0 mov eax, dword ptr fs:[00000030h]2_2_0393C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B07C3 mov eax, dword ptr fs:[00000030h]2_2_039B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039347FB mov eax, dword ptr fs:[00000030h]2_2_039347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039347FB mov eax, dword ptr fs:[00000030h]2_2_039347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE7E1 mov eax, dword ptr fs:[00000030h]2_2_039BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930710 mov eax, dword ptr fs:[00000030h]2_2_03930710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960710 mov eax, dword ptr fs:[00000030h]2_2_03960710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C700 mov eax, dword ptr fs:[00000030h]2_2_0396C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov eax, dword ptr fs:[00000030h]2_2_0396273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov ecx, dword ptr fs:[00000030h]2_2_0396273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov eax, dword ptr fs:[00000030h]2_2_0396273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AC730 mov eax, dword ptr fs:[00000030h]2_2_039AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C720 mov eax, dword ptr fs:[00000030h]2_2_0396C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C720 mov eax, dword ptr fs:[00000030h]2_2_0396C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930750 mov eax, dword ptr fs:[00000030h]2_2_03930750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE75D mov eax, dword ptr fs:[00000030h]2_2_039BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972750 mov eax, dword ptr fs:[00000030h]2_2_03972750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972750 mov eax, dword ptr fs:[00000030h]2_2_03972750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4755 mov eax, dword ptr fs:[00000030h]2_2_039B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov esi, dword ptr fs:[00000030h]2_2_0396674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov eax, dword ptr fs:[00000030h]2_2_0396674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov eax, dword ptr fs:[00000030h]2_2_0396674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938770 mov eax, dword ptr fs:[00000030h]2_2_03938770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934690 mov eax, dword ptr fs:[00000030h]2_2_03934690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934690 mov eax, dword ptr fs:[00000030h]2_2_03934690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039666B0 mov eax, dword ptr fs:[00000030h]2_2_039666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C6A6 mov eax, dword ptr fs:[00000030h]2_2_0396C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0396A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A6C7 mov eax, dword ptr fs:[00000030h]2_2_0396A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B06F1 mov eax, dword ptr fs:[00000030h]2_2_039B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B06F1 mov eax, dword ptr fs:[00000030h]2_2_039B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972619 mov eax, dword ptr fs:[00000030h]2_2_03972619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE609 mov eax, dword ptr fs:[00000030h]2_2_039AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E627 mov eax, dword ptr fs:[00000030h]2_2_0394E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03966620 mov eax, dword ptr fs:[00000030h]2_2_03966620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968620 mov eax, dword ptr fs:[00000030h]2_2_03968620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393262C mov eax, dword ptr fs:[00000030h]2_2_0393262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394C640 mov eax, dword ptr fs:[00000030h]2_2_0394C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03962674 mov eax, dword ptr fs:[00000030h]2_2_03962674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F866E mov eax, dword ptr fs:[00000030h]2_2_039F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F866E mov eax, dword ptr fs:[00000030h]2_2_039F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A660 mov eax, dword ptr fs:[00000030h]2_2_0396A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A660 mov eax, dword ptr fs:[00000030h]2_2_0396A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E59C mov eax, dword ptr fs:[00000030h]2_2_0396E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932582 mov eax, dword ptr fs:[00000030h]2_2_03932582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932582 mov ecx, dword ptr fs:[00000030h]2_2_03932582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964588 mov eax, dword ptr fs:[00000030h]2_2_03964588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039545B1 mov eax, dword ptr fs:[00000030h]2_2_039545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039545B1 mov eax, dword ptr fs:[00000030h]2_2_039545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039365D0 mov eax, dword ptr fs:[00000030h]2_2_039365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A5D0 mov eax, dword ptr fs:[00000030h]2_2_0396A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A5D0 mov eax, dword ptr fs:[00000030h]2_2_0396A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E5CF mov eax, dword ptr fs:[00000030h]2_2_0396E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E5CF mov eax, dword ptr fs:[00000030h]2_2_0396E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039325E0 mov eax, dword ptr fs:[00000030h]2_2_039325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C5ED mov eax, dword ptr fs:[00000030h]2_2_0396C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C5ED mov eax, dword ptr fs:[00000030h]2_2_0396C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6500 mov eax, dword ptr fs:[00000030h]2_2_039C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938550 mov eax, dword ptr fs:[00000030h]2_2_03938550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938550 mov eax, dword ptr fs:[00000030h]2_2_03938550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA49A mov eax, dword ptr fs:[00000030h]2_2_039EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039644B0 mov ecx, dword ptr fs:[00000030h]2_2_039644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BA4B0 mov eax, dword ptr fs:[00000030h]2_2_039BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039364AB mov eax, dword ptr fs:[00000030h]2_2_039364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039304E5 mov ecx, dword ptr fs:[00000030h]2_2_039304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A430 mov eax, dword ptr fs:[00000030h]2_2_0396A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C427 mov eax, dword ptr fs:[00000030h]2_2_0392C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA456 mov eax, dword ptr fs:[00000030h]2_2_039EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392645D mov eax, dword ptr fs:[00000030h]2_2_0392645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395245A mov eax, dword ptr fs:[00000030h]2_2_0395245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC460 mov ecx, dword ptr fs:[00000030h]2_2_039BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940BBE mov eax, dword ptr fs:[00000030h]2_2_03940BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940BBE mov eax, dword ptr fs:[00000030h]2_2_03940BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4BB0 mov eax, dword ptr fs:[00000030h]2_2_039E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4BB0 mov eax, dword ptr fs:[00000030h]2_2_039E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEBD0 mov eax, dword ptr fs:[00000030h]2_2_039DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EBFC mov eax, dword ptr fs:[00000030h]2_2_0395EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BCBF0 mov eax, dword ptr fs:[00000030h]2_2_039BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04B00 mov eax, dword ptr fs:[00000030h]2_2_03A04B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EB20 mov eax, dword ptr fs:[00000030h]2_2_0395EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EB20 mov eax, dword ptr fs:[00000030h]2_2_0395EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F8B28 mov eax, dword ptr fs:[00000030h]2_2_039F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F8B28 mov eax, dword ptr fs:[00000030h]2_2_039F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928B50 mov eax, dword ptr fs:[00000030h]2_2_03928B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEB50 mov eax, dword ptr fs:[00000030h]2_2_039DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4B4B mov eax, dword ptr fs:[00000030h]2_2_039E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4B4B mov eax, dword ptr fs:[00000030h]2_2_039E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6B40 mov eax, dword ptr fs:[00000030h]2_2_039C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6B40 mov eax, dword ptr fs:[00000030h]2_2_039C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FAB40 mov eax, dword ptr fs:[00000030h]2_2_039FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D8B42 mov eax, dword ptr fs:[00000030h]2_2_039D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392CB7E mov eax, dword ptr fs:[00000030h]2_2_0392CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968A90 mov edx, dword ptr fs:[00000030h]2_2_03968A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04A80 mov eax, dword ptr fs:[00000030h]2_2_03A04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938AA0 mov eax, dword ptr fs:[00000030h]2_2_03938AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938AA0 mov eax, dword ptr fs:[00000030h]2_2_03938AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986AA4 mov eax, dword ptr fs:[00000030h]2_2_03986AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930AD0 mov eax, dword ptr fs:[00000030h]2_2_03930AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964AD0 mov eax, dword ptr fs:[00000030h]2_2_03964AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964AD0 mov eax, dword ptr fs:[00000030h]2_2_03964AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396AAEE mov eax, dword ptr fs:[00000030h]2_2_0396AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396AAEE mov eax, dword ptr fs:[00000030h]2_2_0396AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BCA11 mov eax, dword ptr fs:[00000030h]2_2_039BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03954A35 mov eax, dword ptr fs:[00000030h]2_2_03954A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03954A35 mov eax, dword ptr fs:[00000030h]2_2_03954A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA38 mov eax, dword ptr fs:[00000030h]2_2_0396CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA24 mov eax, dword ptr fs:[00000030h]2_2_0396CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EA2E mov eax, dword ptr fs:[00000030h]2_2_0395EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940A5B mov eax, dword ptr fs:[00000030h]2_2_03940A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940A5B mov eax, dword ptr fs:[00000030h]2_2_03940A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039ACA72 mov eax, dword ptr fs:[00000030h]2_2_039ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039ACA72 mov eax, dword ptr fs:[00000030h]2_2_039ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEA60 mov eax, dword ptr fs:[00000030h]2_2_039DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov esi, dword ptr fs:[00000030h]2_2_039B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov eax, dword ptr fs:[00000030h]2_2_039B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov eax, dword ptr fs:[00000030h]2_2_039B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD mov eax, dword ptr fs:[00000030h]2_2_039309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD mov eax, dword ptr fs:[00000030h]2_2_039309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039649D0 mov eax, dword ptr fs:[00000030h]2_2_039649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA9D3 mov eax, dword ptr fs:[00000030h]2_2_039FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C69C0 mov eax, dword ptr fs:[00000030h]2_2_039C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039629F9 mov eax, dword ptr fs:[00000030h]2_2_039629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039629F9 mov eax, dword ptr fs:[00000030h]2_2_039629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE9E0 mov eax, dword ptr fs:[00000030h]2_2_039BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC912 mov eax, dword ptr fs:[00000030h]2_2_039BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928918 mov eax, dword ptr fs:[00000030h]2_2_03928918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928918 mov eax, dword ptr fs:[00000030h]2_2_03928918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE908 mov eax, dword ptr fs:[00000030h]2_2_039AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE908 mov eax, dword ptr fs:[00000030h]2_2_039AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B892A mov eax, dword ptr fs:[00000030h]2_2_039B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C892B mov eax, dword ptr fs:[00000030h]2_2_039C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0946 mov eax, dword ptr fs:[00000030h]2_2_039B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04940 mov eax, dword ptr fs:[00000030h]2_2_03A04940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4978 mov eax, dword ptr fs:[00000030h]2_2_039D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4978 mov eax, dword ptr fs:[00000030h]2_2_039D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC97C mov eax, dword ptr fs:[00000030h]2_2_039BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov eax, dword ptr fs:[00000030h]2_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov edx, dword ptr fs:[00000030h]2_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov eax, dword ptr fs:[00000030h]2_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC89D mov eax, dword ptr fs:[00000030h]2_2_039BC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930887 mov eax, dword ptr fs:[00000030h]2_2_03930887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E8C0 mov eax, dword ptr fs:[00000030h]2_2_0395E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A008C0 mov eax, dword ptr fs:[00000030h]2_2_03A008C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C8F9 mov eax, dword ptr fs:[00000030h]2_2_0396C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C8F9 mov eax, dword ptr fs:[00000030h]2_2_0396C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA8E4 mov eax, dword ptr fs:[00000030h]2_2_039FA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC810 mov eax, dword ptr fs:[00000030h]2_2_039BC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007281D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007281D4
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006FA2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006FA2D5
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006FA2A4 SetUnhandledExceptionFilter,0_2_006FA2A4

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2CC3008Jump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00728A73 LogonUserW,0_2_00728A73
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006D3B4C
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006D4A35
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00734CFA mouse_event,0_2_00734CFA
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\z1PURCHASEORDER.exe"Jump to behavior
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007281D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_007281D4
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00734A08 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00734A08
          Source: z1PURCHASEORDER.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: z1PURCHASEORDER.exeBinary or memory string: Shell_TrayWnd
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006F87AB cpuid 0_2_006F87AB
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00705007 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00705007
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0071215F GetUserNameW,0_2_0071215F
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_007040BA __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007040BA
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_006D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006D4AFE

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: z1PURCHASEORDER.exeBinary or memory string: WIN_81
          Source: z1PURCHASEORDER.exeBinary or memory string: WIN_XP
          Source: z1PURCHASEORDER.exeBinary or memory string: WIN_XPe
          Source: z1PURCHASEORDER.exeBinary or memory string: WIN_VISTA
          Source: z1PURCHASEORDER.exeBinary or memory string: WIN_7
          Source: z1PURCHASEORDER.exeBinary or memory string: WIN_8
          Source: z1PURCHASEORDER.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_00746399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00746399
          Source: C:\Users\user\Desktop\z1PURCHASEORDER.exeCode function: 0_2_0074685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0074685D
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory15
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem1
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          z1PURCHASEORDER.exe29%ReversingLabsWin32.Trojan.Swotter
          z1PURCHASEORDER.exe25%VirustotalBrowse
          z1PURCHASEORDER.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1528899
          Start date and time:2024-10-08 12:31:11 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 40s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:z1PURCHASEORDER.exe
          Detection:MAL
          Classification:mal92.troj.evad.winEXE@3/2@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 47
          • Number of non-executed functions: 270
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          TimeTypeDescription
          06:32:36API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\z1PURCHASEORDER.exe
          File Type:data
          Category:dropped
          Size (bytes):288768
          Entropy (8bit):7.990731142855584
          Encrypted:true
          SSDEEP:6144:yNliqdmZ57RYZ+BqjAwMUgaLYtdOTOu/ro:Siq4JA+XwgaEjwj/ro
          MD5:909E055FA907D841DF5F29B434290020
          SHA1:F36F5A82D166379E667D6BBB20862C7992B554F8
          SHA-256:CE64737FEC4E78C9D1C625DAE63B6B5BF3F71201A150138FDEC3EFA2FF653337
          SHA-512:999EC1A4EE98731D92A701823E23FC18D188B764E9ACEBA5DC99D0B48474C33F5C9D7C4E4850BA628933A6DC156898DE49029FC4ACA95D26E81F2840A2AD916C
          Malicious:false
          Reputation:low
          Preview:.....P60T.._..d.63..{U@...XP60TSMSVHTPSXP60TSMSVHTPSXP60.SMSXW.^S.Y...R..w.<9 x D_3!,>v+5>=7$.R1s?&8h=>s..e.9<)6xEYZwXP60TSM*WA.m3?..P3.p31.N...jVW.I...t47.B...h3*..!78n87.0TSMSVHT..XPz1USD..(TPSXP60T.MQWCU[SX.20TSMSVHTP.LP60DSMS&LTPS.P6 TSMQVHRPSXP60TUMSVHTPSX 20TQMSVHTPQX..0TCMSFHTPSHP6 TSMSVHDPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTP},5NDTSM..LTPCXP6fPSMCVHTPSXP60TSMSVhTP3XP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMS
          Process:C:\Users\user\Desktop\z1PURCHASEORDER.exe
          File Type:data
          Category:dropped
          Size (bytes):288768
          Entropy (8bit):7.990731142855584
          Encrypted:true
          SSDEEP:6144:yNliqdmZ57RYZ+BqjAwMUgaLYtdOTOu/ro:Siq4JA+XwgaEjwj/ro
          MD5:909E055FA907D841DF5F29B434290020
          SHA1:F36F5A82D166379E667D6BBB20862C7992B554F8
          SHA-256:CE64737FEC4E78C9D1C625DAE63B6B5BF3F71201A150138FDEC3EFA2FF653337
          SHA-512:999EC1A4EE98731D92A701823E23FC18D188B764E9ACEBA5DC99D0B48474C33F5C9D7C4E4850BA628933A6DC156898DE49029FC4ACA95D26E81F2840A2AD916C
          Malicious:false
          Reputation:low
          Preview:.....P60T.._..d.63..{U@...XP60TSMSVHTPSXP60TSMSVHTPSXP60.SMSXW.^S.Y...R..w.<9 x D_3!,>v+5>=7$.R1s?&8h=>s..e.9<)6xEYZwXP60TSM*WA.m3?..P3.p31.N...jVW.I...t47.B...h3*..!78n87.0TSMSVHT..XPz1USD..(TPSXP60T.MQWCU[SX.20TSMSVHTP.LP60DSMS&LTPS.P6 TSMQVHRPSXP60TUMSVHTPSX 20TQMSVHTPQX..0TCMSFHTPSHP6 TSMSVHDPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTP},5NDTSM..LTPCXP6fPSMCVHTPSXP60TSMSVhTP3XP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMSVHTPSXP60TSMS
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.1806627049183005
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:z1PURCHASEORDER.exe
          File size:1'199'104 bytes
          MD5:c4224dd3cd6d013992c9680812a7f946
          SHA1:753a273f0864ebeebbb05fab9767e714b31edd1c
          SHA256:4fd906a04bf473c85deb5f4689c592b97e0ec46c747ff130bec022956369f59d
          SHA512:999f18bdc58cf4b347dcab6d9b4cabf90274b6b7f6521314354867c0997b20310e7b9b514af70a2cc5256be741901648b42a3f436ee98e32567a19eac3025e04
          SSDEEP:24576:xCdxte/80jYLT3U1jfsWawqDLWXTtJkUq7qbxaiNWZ7Q:ww80cTsjkWaw4iDtJkUqgxeq
          TLSH:2B45CE2273DDC360CB769173BF69B7016EBF78610630B85B2F881D7DA950162162DBA3
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
          Icon Hash:aaf3e3e3938382a0
          Entrypoint:0x427f4a
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
          Time Stamp:0x67048781 [Tue Oct 8 01:14:41 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:afcdf79be1557326c854b6e20cb900a7
          Instruction
          call 00007F476D1560BDh
          jmp 00007F476D148E84h
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          push edi
          push esi
          mov esi, dword ptr [esp+10h]
          mov ecx, dword ptr [esp+14h]
          mov edi, dword ptr [esp+0Ch]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007F476D14900Ah
          cmp edi, eax
          jc 00007F476D14936Eh
          bt dword ptr [004C31FCh], 01h
          jnc 00007F476D149009h
          rep movsb
          jmp 00007F476D14931Ch
          cmp ecx, 00000080h
          jc 00007F476D1491D4h
          mov eax, edi
          xor eax, esi
          test eax, 0000000Fh
          jne 00007F476D149010h
          bt dword ptr [004BE324h], 01h
          jc 00007F476D1494E0h
          bt dword ptr [004C31FCh], 00000000h
          jnc 00007F476D1491ADh
          test edi, 00000003h
          jne 00007F476D1491BEh
          test esi, 00000003h
          jne 00007F476D14919Dh
          bt edi, 02h
          jnc 00007F476D14900Fh
          mov eax, dword ptr [esi]
          sub ecx, 04h
          lea esi, dword ptr [esi+04h]
          mov dword ptr [edi], eax
          lea edi, dword ptr [edi+04h]
          bt edi, 03h
          jnc 00007F476D149013h
          movq xmm1, qword ptr [esi]
          sub ecx, 08h
          lea esi, dword ptr [esi+08h]
          movq qword ptr [edi], xmm1
          lea edi, dword ptr [edi+08h]
          test esi, 00000007h
          je 00007F476D149065h
          bt esi, 03h
          Programming Language:
          • [ASM] VS2013 build 21005
          • [ C ] VS2013 build 21005
          • [C++] VS2013 build 21005
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2013 UPD5 build 40629
          • [RES] VS2013 build 21005
          • [LNK] VS2013 UPD5 build 40629
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5c2c0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1240000x7130.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8dd2e0x8de00c2c2260508750422d20cd5cbb116b146False0.5729952505506608data6.675875439961112IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x8f0000x2e10e0x2e2004513b58651e3d8d87c81a396e5b2f1d1False0.3353340955284553OpenPGP Public Key5.760731648769018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xbe0000x8f740x5200c2de4a3d214eae7e87c7bfc06bd79775False0.1017530487804878data1.1988106744719143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xc70000x5c2c00x5c4004d4c72ae70b64204bfbb7acbf388d2cdFalse0.9285018631436315data7.896058052099251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x1240000x71300x72001254908a9a03d2bcf12045d49cd572b9False0.7703536184210527data6.782377328042204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
          RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
          RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
          RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
          RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
          RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
          RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
          RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
          RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
          RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
          RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
          RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
          RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
          RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
          RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
          RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
          RT_RCDATA0xcf7b80x53587data1.0003251480009256
          RT_GROUP_ICON0x122d400x76dataEnglishGreat Britain0.6610169491525424
          RT_GROUP_ICON0x122db80x14dataEnglishGreat Britain1.25
          RT_GROUP_ICON0x122dcc0x14dataEnglishGreat Britain1.15
          RT_GROUP_ICON0x122de00x14dataEnglishGreat Britain1.25
          RT_VERSION0x122df40xdcdataEnglishGreat Britain0.6181818181818182
          RT_MANIFEST0x122ed00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
          DLLImport
          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
          PSAPI.DLLGetProcessMemoryInfo
          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
          UxTheme.dllIsThemeActive
          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:06:32:11
          Start date:08/10/2024
          Path:C:\Users\user\Desktop\z1PURCHASEORDER.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\z1PURCHASEORDER.exe"
          Imagebase:0x6d0000
          File size:1'199'104 bytes
          MD5 hash:C4224DD3CD6D013992C9680812A7F946
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:2
          Start time:06:32:12
          Start date:08/10/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\z1PURCHASEORDER.exe"
          Imagebase:0x270000
          File size:46'504 bytes
          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1701368119.0000000003C50000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1700764927.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.7%
            Dynamic/Decrypted Code Coverage:0.4%
            Signature Coverage:8.4%
            Total number of Nodes:2000
            Total number of Limit Nodes:80
            execution_graph 97350 6d107d 97355 6d71eb 97350->97355 97352 6d108c 97386 6f2ec0 97352->97386 97356 6d71fb __ftell_nolock 97355->97356 97389 6d77c7 97356->97389 97360 6d72ba 97401 6f068b 97360->97401 97367 6d77c7 59 API calls 97368 6d72eb 97367->97368 97420 6d7eec 97368->97420 97370 6d72f4 RegOpenKeyExW 97371 70ec0a RegQueryValueExW 97370->97371 97376 6d7316 Mailbox 97370->97376 97372 70ec27 97371->97372 97373 70ec9c RegCloseKey 97371->97373 97424 6f0f36 97372->97424 97373->97376 97385 70ecae _wcscat Mailbox __wsetenvp 97373->97385 97375 70ec40 97434 6d538e 97375->97434 97376->97352 97377 6d7b52 59 API calls 97377->97385 97380 70ec68 97437 6d7d2c 97380->97437 97382 70ec82 97382->97373 97384 6d3f84 59 API calls 97384->97385 97385->97376 97385->97377 97385->97384 97446 6d7f41 97385->97446 97511 6f2dc4 97386->97511 97388 6d1096 97390 6f0f36 Mailbox 59 API calls 97389->97390 97391 6d77e8 97390->97391 97392 6f0f36 Mailbox 59 API calls 97391->97392 97393 6d72b1 97392->97393 97394 6d4864 97393->97394 97450 701ac0 97394->97450 97397 6d7f41 59 API calls 97398 6d4897 97397->97398 97452 6d48ae 97398->97452 97400 6d48a1 Mailbox 97400->97360 97402 701ac0 __ftell_nolock 97401->97402 97403 6f0698 GetFullPathNameW 97402->97403 97404 6f06ba 97403->97404 97405 6d7d2c 59 API calls 97404->97405 97406 6d72c5 97405->97406 97407 6d7e0b 97406->97407 97408 6d7e1f 97407->97408 97409 70f0a3 97407->97409 97474 6d7db0 97408->97474 97479 6d8189 97409->97479 97412 6d72d3 97414 6d3f84 97412->97414 97413 70f0ae __wsetenvp _memmove 97416 6d3f92 97414->97416 97419 6d3fb4 _memmove 97414->97419 97415 6f0f36 Mailbox 59 API calls 97418 6d3fc8 97415->97418 97417 6f0f36 Mailbox 59 API calls 97416->97417 97417->97419 97418->97367 97419->97415 97421 6d7ef9 97420->97421 97422 6d7f06 97420->97422 97421->97370 97423 6f0f36 Mailbox 59 API calls 97422->97423 97423->97421 97426 6f0f3e 97424->97426 97427 6f0f58 97426->97427 97429 6f0f5c std::exception::exception 97426->97429 97482 6f588c 97426->97482 97499 6f3521 DecodePointer 97426->97499 97427->97375 97500 6f871b RaiseException 97429->97500 97431 6f0f86 97501 6f8651 58 API calls _free 97431->97501 97433 6f0f98 97433->97375 97435 6f0f36 Mailbox 59 API calls 97434->97435 97436 6d53a0 RegQueryValueExW 97435->97436 97436->97380 97436->97382 97438 6d7d38 __wsetenvp 97437->97438 97439 6d7da5 97437->97439 97441 6d7d4e 97438->97441 97442 6d7d73 97438->97442 97440 6d7e8c 59 API calls 97439->97440 97445 6d7d56 _memmove 97440->97445 97510 6d8087 59 API calls Mailbox 97441->97510 97444 6d8189 59 API calls 97442->97444 97444->97445 97445->97382 97447 6d7f50 __wsetenvp _memmove 97446->97447 97448 6f0f36 Mailbox 59 API calls 97447->97448 97449 6d7f8e 97448->97449 97449->97385 97451 6d4871 GetModuleFileNameW 97450->97451 97451->97397 97453 701ac0 __ftell_nolock 97452->97453 97454 6d48bb GetFullPathNameW 97453->97454 97455 6d48da 97454->97455 97456 6d48f7 97454->97456 97458 6d7d2c 59 API calls 97455->97458 97457 6d7eec 59 API calls 97456->97457 97459 6d48e6 97457->97459 97458->97459 97462 6d7886 97459->97462 97463 6d7894 97462->97463 97466 6d7e8c 97463->97466 97465 6d48f2 97465->97400 97467 6d7e9a 97466->97467 97469 6d7ea3 _memmove 97466->97469 97467->97469 97470 6d7faf 97467->97470 97469->97465 97471 6d7fc2 97470->97471 97473 6d7fbf _memmove 97470->97473 97472 6f0f36 Mailbox 59 API calls 97471->97472 97472->97473 97473->97469 97475 6d7dbf __wsetenvp 97474->97475 97476 6d8189 59 API calls 97475->97476 97477 6d7dd0 _memmove 97475->97477 97478 70f060 _memmove 97476->97478 97477->97412 97480 6f0f36 Mailbox 59 API calls 97479->97480 97481 6d8193 97480->97481 97481->97413 97483 6f5907 97482->97483 97496 6f5898 97482->97496 97508 6f3521 DecodePointer 97483->97508 97485 6f590d 97509 6f8ca8 58 API calls __getptd_noexit 97485->97509 97486 6f58a3 97486->97496 97502 6fa2eb 58 API calls 2 library calls 97486->97502 97503 6fa348 58 API calls 7 library calls 97486->97503 97504 6f321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97486->97504 97489 6f58cb RtlAllocateHeap 97490 6f58ff 97489->97490 97489->97496 97490->97426 97492 6f58f3 97506 6f8ca8 58 API calls __getptd_noexit 97492->97506 97496->97486 97496->97489 97496->97492 97497 6f58f1 97496->97497 97505 6f3521 DecodePointer 97496->97505 97507 6f8ca8 58 API calls __getptd_noexit 97497->97507 97499->97426 97500->97431 97501->97433 97502->97486 97503->97486 97505->97496 97506->97497 97507->97490 97508->97485 97509->97490 97510->97445 97512 6f2dd0 _fseek 97511->97512 97519 6f3397 97512->97519 97518 6f2df7 _fseek 97518->97388 97536 6f9d8b 97519->97536 97521 6f2dd9 97522 6f2e08 DecodePointer DecodePointer 97521->97522 97523 6f2de5 97522->97523 97524 6f2e35 97522->97524 97533 6f2e02 97523->97533 97524->97523 97582 6f8924 59 API calls _fseek 97524->97582 97526 6f2e98 EncodePointer EncodePointer 97526->97523 97527 6f2e47 97527->97526 97528 6f2e6c 97527->97528 97583 6f89e4 61 API calls 2 library calls 97527->97583 97528->97523 97531 6f2e86 EncodePointer 97528->97531 97584 6f89e4 61 API calls 2 library calls 97528->97584 97531->97526 97532 6f2e80 97532->97523 97532->97531 97585 6f33a0 97533->97585 97537 6f9daf EnterCriticalSection 97536->97537 97538 6f9d9c 97536->97538 97537->97521 97543 6f9e13 97538->97543 97540 6f9da2 97540->97537 97567 6f3235 58 API calls 3 library calls 97540->97567 97544 6f9e1f _fseek 97543->97544 97545 6f9e28 97544->97545 97546 6f9e40 97544->97546 97568 6fa2eb 58 API calls 2 library calls 97545->97568 97554 6f9e61 _fseek 97546->97554 97571 6f899d 58 API calls 2 library calls 97546->97571 97549 6f9e2d 97569 6fa348 58 API calls 7 library calls 97549->97569 97550 6f9e55 97552 6f9e5c 97550->97552 97553 6f9e6b 97550->97553 97572 6f8ca8 58 API calls __getptd_noexit 97552->97572 97558 6f9d8b __lock 58 API calls 97553->97558 97554->97540 97555 6f9e34 97570 6f321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97555->97570 97560 6f9e72 97558->97560 97561 6f9e7f 97560->97561 97562 6f9e97 97560->97562 97573 6f9fab InitializeCriticalSectionAndSpinCount 97561->97573 97574 6f2ed5 97562->97574 97565 6f9e8b 97580 6f9eb3 LeaveCriticalSection _doexit 97565->97580 97568->97549 97569->97555 97571->97550 97572->97554 97573->97565 97575 6f2ede RtlFreeHeap 97574->97575 97576 6f2f07 _free 97574->97576 97575->97576 97577 6f2ef3 97575->97577 97576->97565 97581 6f8ca8 58 API calls __getptd_noexit 97577->97581 97579 6f2ef9 GetLastError 97579->97576 97580->97554 97581->97579 97582->97527 97583->97528 97584->97532 97588 6f9ef5 LeaveCriticalSection 97585->97588 97587 6f2e07 97587->97518 97588->97587 97589 138b3e8 97603 1389038 97589->97603 97591 138b4ac 97606 138b2d8 97591->97606 97609 138c4d8 GetPEB 97603->97609 97605 13896c3 97605->97591 97607 138b2e1 Sleep 97606->97607 97608 138b2ef 97607->97608 97610 138c502 97609->97610 97610->97605 97611 6de5ec 97614 6dce1a 97611->97614 97613 6de5f8 97615 6dce86 97614->97615 97616 6dce32 97614->97616 97617 6dceaf 97615->97617 97647 739ed4 89 API calls 4 library calls 97615->97647 97616->97615 97623 6da000 97616->97623 97617->97613 97620 712915 97620->97620 97621 6dce69 97621->97617 97646 6d9e9c 60 API calls Mailbox 97621->97646 97624 6da01f 97623->97624 97639 6da04d Mailbox 97623->97639 97625 6f0f36 Mailbox 59 API calls 97624->97625 97625->97639 97626 6db5d5 97651 6d81a7 97626->97651 97628 6d77c7 59 API calls 97628->97639 97631 6f2ec0 67 API calls __cinit 97631->97639 97632 6f0f36 59 API calls Mailbox 97632->97639 97633 7103ae 97650 739ed4 89 API calls 4 library calls 97633->97650 97637 6d81a7 59 API calls 97637->97639 97638 7103bd 97638->97621 97639->97626 97639->97628 97639->97631 97639->97632 97639->97633 97639->97637 97640 7271e5 59 API calls 97639->97640 97641 6da1b7 97639->97641 97642 710d2f 97639->97642 97644 6db5da 97639->97644 97645 6da6ba 97639->97645 97648 6dca20 341 API calls 2 library calls 97639->97648 97649 6dba60 60 API calls Mailbox 97639->97649 97640->97639 97641->97621 97656 739ed4 89 API calls 4 library calls 97642->97656 97657 739ed4 89 API calls 4 library calls 97644->97657 97655 739ed4 89 API calls 4 library calls 97645->97655 97646->97615 97647->97620 97648->97639 97649->97639 97650->97638 97652 6d81ba 97651->97652 97653 6d81b2 97651->97653 97652->97641 97658 6d80d7 59 API calls 2 library calls 97653->97658 97655->97641 97656->97644 97657->97641 97658->97652 97659 710180 97671 6efac4 97659->97671 97661 710196 97662 710217 97661->97662 97663 7101ac 97661->97663 97680 6dfe40 97662->97680 97760 6d9fbd 60 API calls 97663->97760 97667 7101eb 97670 71020b Mailbox 97667->97670 97761 7383f8 59 API calls Mailbox 97667->97761 97668 710c10 Mailbox 97670->97668 97762 739ed4 89 API calls 4 library calls 97670->97762 97672 6efae2 97671->97672 97673 6efad0 97671->97673 97675 6efae8 97672->97675 97676 6efb11 97672->97676 97763 6d9e9c 60 API calls Mailbox 97673->97763 97679 6f0f36 Mailbox 59 API calls 97675->97679 97764 6d9e9c 60 API calls Mailbox 97676->97764 97678 6efada 97678->97661 97679->97678 97765 6d82e0 97680->97765 97682 6dfe9d 97683 6e0856 97682->97683 97684 714a86 97682->97684 97770 6df394 97682->97770 97863 739ed4 89 API calls 4 library calls 97683->97863 97864 739ed4 89 API calls 4 library calls 97684->97864 97688 714a9b 97689 6dff9e 97690 714be6 97689->97690 97692 6dffac 97689->97692 97868 726a42 59 API calls 2 library calls 97689->97868 97690->97688 97690->97692 97870 74a3ee 85 API calls Mailbox 97690->97870 97691 6e0677 97699 6f0f36 Mailbox 59 API calls 97691->97699 97701 714c52 97692->97701 97746 714eac 97692->97746 97774 6d84dc 97692->97774 97693 714b30 97693->97688 97866 739ed4 89 API calls 4 library calls 97693->97866 97696 6f0f36 59 API calls Mailbox 97733 6dff33 97696->97733 97707 6e06a5 _memmove 97699->97707 97700 714ba1 97869 726363 59 API calls 2 library calls 97700->97869 97708 714c70 97701->97708 97872 6d8720 59 API calls Mailbox 97701->97872 97705 714aae 97705->97693 97865 6df803 341 API calls 97705->97865 97718 6f0f36 Mailbox 59 API calls 97707->97718 97714 714c81 97708->97714 97873 6d8720 59 API calls Mailbox 97708->97873 97709 6e0004 97716 6e0092 97709->97716 97717 714e2f 97709->97717 97752 6e02d9 Mailbox _memmove 97709->97752 97710 714bc4 97712 6da000 341 API calls 97710->97712 97711 714c0b Mailbox 97711->97692 97871 726a42 59 API calls 2 library calls 97711->97871 97712->97690 97714->97752 97874 72631f 59 API calls Mailbox 97714->97874 97720 6f0f36 Mailbox 59 API calls 97716->97720 97883 739b90 60 API calls 97717->97883 97758 6e0266 _memmove 97718->97758 97723 6e0099 97720->97723 97723->97683 97781 6e0b30 97723->97781 97724 6da000 341 API calls 97724->97733 97725 714da6 97726 6da000 341 API calls 97725->97726 97728 714de0 97726->97728 97728->97688 97878 6d8620 97728->97878 97730 6e0112 97730->97683 97730->97707 97738 6e0146 97730->97738 97732 714b65 97867 739ed4 89 API calls 4 library calls 97732->97867 97733->97688 97733->97689 97733->97691 97733->97696 97733->97705 97733->97707 97733->97724 97733->97732 97737 714e0b 97882 739ed4 89 API calls 4 library calls 97737->97882 97742 6d81a7 59 API calls 97738->97742 97743 6e0167 97738->97743 97742->97743 97743->97683 97747 714e7d 97743->97747 97750 6e01ac 97743->97750 97744 6e04f8 97744->97670 97745 6f0f36 59 API calls Mailbox 97745->97752 97746->97688 97885 739ed4 89 API calls 4 library calls 97746->97885 97884 6d9e9c 60 API calls Mailbox 97747->97884 97749 6e0238 97858 6d9e9c 60 API calls Mailbox 97749->97858 97750->97683 97750->97746 97750->97749 97752->97683 97752->97725 97752->97737 97752->97744 97752->97745 97753 714d75 97752->97753 97860 6d88a0 68 API calls __cinit 97752->97860 97861 6d87c0 68 API calls 97752->97861 97875 7359de 68 API calls 97752->97875 97876 6d8b13 69 API calls Mailbox 97752->97876 97877 6d9e9c 60 API calls Mailbox 97752->97877 97756 6f0f36 Mailbox 59 API calls 97753->97756 97754 6e024b 97754->97683 97859 6d843f 59 API calls Mailbox 97754->97859 97756->97725 97758->97752 97759 6e02c2 97758->97759 97862 6d9df0 59 API calls Mailbox 97758->97862 97759->97670 97760->97667 97761->97670 97762->97668 97763->97678 97764->97678 97766 6d82ef 97765->97766 97769 6d830a 97765->97769 97767 6d7faf 59 API calls 97766->97767 97768 6d82f7 CharUpperBuffW 97767->97768 97768->97769 97769->97682 97771 6df3b1 97770->97771 97773 6df3d2 97771->97773 97886 739ed4 89 API calls 4 library calls 97771->97886 97773->97733 97775 6d84ed 97774->97775 97776 70f116 97774->97776 97777 6f0f36 Mailbox 59 API calls 97775->97777 97778 6d84f4 97777->97778 97779 6d8515 97778->97779 97887 6d8794 59 API calls Mailbox 97778->97887 97779->97701 97779->97709 97782 71501c 97781->97782 97796 6e0b55 97781->97796 97950 739ed4 89 API calls 4 library calls 97782->97950 97784 6e0e5a 97784->97730 97786 6e1044 97786->97784 97788 6e1051 97786->97788 97948 6e11f3 341 API calls Mailbox 97788->97948 97789 6e0bab PeekMessageW 97857 6e0b65 Mailbox 97789->97857 97791 6e1058 LockWindowUpdate DestroyWindow GetMessageW 97791->97784 97794 6e108a 97791->97794 97793 7151da Sleep 97793->97857 97797 715fb1 TranslateMessage DispatchMessageW GetMessageW 97794->97797 97795 6e0e44 97795->97784 97947 6e11d0 10 API calls Mailbox 97795->97947 97796->97857 97951 6d9fbd 60 API calls 97796->97951 97952 72669f 341 API calls 97796->97952 97797->97797 97799 715fe1 97797->97799 97799->97784 97800 6e1005 TranslateMessage DispatchMessageW 97801 6e0fa3 PeekMessageW 97800->97801 97801->97857 97802 7150a9 TranslateAcceleratorW 97802->97801 97802->97857 97803 6e0e73 timeGetTime 97803->97857 97804 715b78 WaitForSingleObject 97806 715b95 GetExitCodeProcess CloseHandle 97804->97806 97804->97857 97842 6e10f5 97806->97842 97807 6e0fbf Sleep 97841 6e0fd0 Mailbox 97807->97841 97808 6d81a7 59 API calls 97808->97857 97809 6d77c7 59 API calls 97809->97841 97810 6f0f36 59 API calls Mailbox 97810->97857 97811 715e51 Sleep 97811->97841 97814 6f034a timeGetTime 97814->97841 97815 6e10ae timeGetTime 97949 6d9fbd 60 API calls 97815->97949 97819 715ee8 GetExitCodeProcess 97825 715f14 CloseHandle 97819->97825 97826 715efe WaitForSingleObject 97819->97826 97821 6db89c 314 API calls 97821->97857 97823 755f8e 110 API calls 97823->97841 97824 6db93d 109 API calls 97824->97841 97825->97841 97826->97825 97826->97857 97827 715bcd 97827->97842 97828 715f70 Sleep 97828->97857 97829 7153d1 Sleep 97829->97857 97831 6d7f41 59 API calls 97831->97841 97834 6d9fbd 60 API calls 97834->97857 97837 6da000 314 API calls 97837->97857 97838 6dfe40 314 API calls 97838->97857 97841->97809 97841->97814 97841->97819 97841->97823 97841->97824 97841->97827 97841->97828 97841->97829 97841->97831 97841->97842 97841->97857 97977 732700 60 API calls 97841->97977 97978 6d9fbd 60 API calls 97841->97978 97979 6d8b13 69 API calls Mailbox 97841->97979 97980 6db89c 341 API calls 97841->97980 97981 726830 60 API calls 97841->97981 97982 7352eb QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97841->97982 97983 733c99 66 API calls Mailbox 97841->97983 97842->97730 97844 739ed4 89 API calls 97844->97857 97846 6d9df0 59 API calls Mailbox 97846->97857 97847 6d8620 69 API calls 97847->97857 97849 7263f2 59 API calls Mailbox 97849->97857 97850 71592e VariantClear 97850->97857 97851 6d8e34 59 API calls Mailbox 97851->97857 97852 7159c4 VariantClear 97852->97857 97853 715772 VariantClear 97853->97857 97854 7271e5 59 API calls 97854->97857 97855 6d7f41 59 API calls 97855->97857 97856 6d8b13 69 API calls 97856->97857 97857->97789 97857->97793 97857->97795 97857->97800 97857->97801 97857->97802 97857->97803 97857->97804 97857->97807 97857->97808 97857->97810 97857->97811 97857->97815 97857->97821 97857->97834 97857->97837 97857->97838 97857->97841 97857->97842 97857->97844 97857->97846 97857->97847 97857->97849 97857->97850 97857->97851 97857->97852 97857->97853 97857->97854 97857->97855 97857->97856 97888 6de580 97857->97888 97895 6de800 97857->97895 97926 6df5c0 97857->97926 97946 6d31ce IsDialogMessageW GetClassLongW 97857->97946 97953 756081 59 API calls 97857->97953 97954 739abe 59 API calls Mailbox 97857->97954 97955 72d801 59 API calls 97857->97955 97956 6d9997 97857->97956 97974 726363 59 API calls 2 library calls 97857->97974 97975 6d8561 59 API calls 97857->97975 97976 6d843f 59 API calls Mailbox 97857->97976 97858->97754 97859->97758 97860->97752 97861->97752 97862->97758 97863->97684 97864->97688 97865->97693 97866->97688 97867->97688 97868->97700 97869->97710 97870->97711 97871->97711 97872->97708 97873->97714 97874->97752 97875->97752 97876->97752 97877->97752 97879 6d862b 97878->97879 97880 6d8652 97879->97880 98953 6d8b13 69 API calls Mailbox 97879->98953 97880->97737 97882->97688 97883->97738 97884->97746 97885->97688 97886->97773 97887->97779 97889 6de59d 97888->97889 97890 6de5b1 97888->97890 97984 6de060 341 API calls 2 library calls 97889->97984 97985 739ed4 89 API calls 4 library calls 97890->97985 97892 6de5a8 97892->97857 97894 713dfd 97894->97894 97896 6de835 97895->97896 97897 713e02 97896->97897 97899 6de89f 97896->97899 97909 6de8f9 97896->97909 97898 6da000 341 API calls 97897->97898 97900 713e17 97898->97900 97903 6d77c7 59 API calls 97899->97903 97899->97909 97924 6dead0 Mailbox 97900->97924 97987 739ed4 89 API calls 4 library calls 97900->97987 97901 6d77c7 59 API calls 97901->97909 97905 713e5d 97903->97905 97904 6f2ec0 __cinit 67 API calls 97904->97909 97907 6f2ec0 __cinit 67 API calls 97905->97907 97906 713e7f 97906->97857 97907->97909 97908 6d8620 69 API calls 97908->97924 97909->97901 97909->97904 97909->97906 97911 6deaba 97909->97911 97909->97924 97911->97924 97988 739ed4 89 API calls 4 library calls 97911->97988 97912 6d8ea0 59 API calls 97912->97924 97913 6df2f5 97992 739ed4 89 API calls 4 library calls 97913->97992 97917 6da000 341 API calls 97917->97924 97918 71417e 97918->97857 97921 739ed4 89 API calls 97921->97924 97924->97908 97924->97912 97924->97913 97924->97917 97924->97921 97925 6debd8 97924->97925 97986 6d80d7 59 API calls 2 library calls 97924->97986 97989 7271e5 59 API calls 97924->97989 97990 74c6d7 341 API calls 97924->97990 97991 74b651 341 API calls Mailbox 97924->97991 97993 6d9df0 59 API calls Mailbox 97924->97993 97994 7494db 341 API calls Mailbox 97924->97994 97925->97857 97927 6df61a 97926->97927 97928 6df7b0 97926->97928 97929 714777 97927->97929 97930 6df626 97927->97930 97931 6d7f41 59 API calls 97928->97931 98092 74bd80 341 API calls Mailbox 97929->98092 98090 6df3f0 341 API calls 2 library calls 97930->98090 97937 6df6ec Mailbox 97931->97937 97934 714785 97938 6df790 97934->97938 98093 739ed4 89 API calls 4 library calls 97934->98093 97936 6df65d 97936->97934 97936->97937 97936->97938 97940 6df743 97937->97940 97995 74e037 97937->97995 97998 73cc06 97937->97998 98078 74e04b 97937->98078 98081 6d4faa 97937->98081 98087 733c7b 97937->98087 97938->97857 97940->97938 98091 6d9df0 59 API calls Mailbox 97940->98091 97946->97857 97947->97786 97948->97791 97949->97857 97950->97796 97951->97796 97952->97796 97953->97857 97954->97857 97955->97857 97957 6d99ab 97956->97957 97958 6d99b1 97956->97958 97957->97857 97959 70f92c __i64tow 97958->97959 97960 6d99f9 97958->97960 97964 6d99b7 __itow 97958->97964 97965 70f833 97958->97965 98951 6f3818 83 API calls 3 library calls 97960->98951 97963 6f0f36 Mailbox 59 API calls 97966 6d99d1 97963->97966 97964->97963 97967 70f8ab Mailbox _wcscpy 97965->97967 97968 6f0f36 Mailbox 59 API calls 97965->97968 97966->97957 97969 6d7f41 59 API calls 97966->97969 98952 6f3818 83 API calls 3 library calls 97967->98952 97970 70f878 97968->97970 97969->97957 97971 6f0f36 Mailbox 59 API calls 97970->97971 97972 70f89e 97971->97972 97972->97967 97973 6d7f41 59 API calls 97972->97973 97973->97967 97974->97857 97975->97857 97976->97857 97977->97841 97978->97841 97979->97841 97980->97841 97981->97841 97982->97841 97983->97841 97984->97892 97985->97894 97986->97924 97987->97924 97988->97924 97989->97924 97990->97924 97991->97924 97992->97918 97993->97924 97994->97924 98094 74cbf1 97995->98094 97997 74e047 97997->97940 97999 6d77c7 59 API calls 97998->97999 98000 73cc3b 97999->98000 98001 6d77c7 59 API calls 98000->98001 98002 73cc44 98001->98002 98003 73cc58 98002->98003 98415 6d9c9c 59 API calls 98002->98415 98005 6d9997 84 API calls 98003->98005 98006 73cc75 98005->98006 98007 73cc97 98006->98007 98008 73cd76 98006->98008 98013 73cda6 Mailbox 98006->98013 98009 6d9997 84 API calls 98007->98009 98219 6d4f3d 98008->98219 98011 73cca3 98009->98011 98014 6d81a7 59 API calls 98011->98014 98013->97940 98017 73ccaf 98014->98017 98015 73cda2 98015->98013 98016 6d77c7 59 API calls 98015->98016 98019 73cdd7 98016->98019 98021 73ccc3 98017->98021 98022 73ccf5 98017->98022 98018 6d4f3d 136 API calls 98018->98015 98020 6d77c7 59 API calls 98019->98020 98023 73cde0 98020->98023 98024 6d81a7 59 API calls 98021->98024 98025 6d9997 84 API calls 98022->98025 98026 6d77c7 59 API calls 98023->98026 98027 73ccd3 98024->98027 98028 73cd02 98025->98028 98029 73cde9 98026->98029 98030 6d7e0b 59 API calls 98027->98030 98031 6d81a7 59 API calls 98028->98031 98032 6d77c7 59 API calls 98029->98032 98033 73ccdd 98030->98033 98034 73cd0e 98031->98034 98035 73cdf2 98032->98035 98036 6d9997 84 API calls 98033->98036 98416 734ad8 GetFileAttributesW 98034->98416 98038 6d9997 84 API calls 98035->98038 98040 73cce9 98036->98040 98039 73cdff 98038->98039 98243 6d46f9 98039->98243 98043 6d7c8e 59 API calls 98040->98043 98041 73cd17 98044 73cd2a 98041->98044 98045 6d7b52 59 API calls 98041->98045 98043->98022 98047 6d9997 84 API calls 98044->98047 98053 73cd30 98044->98053 98045->98044 98046 73ce1a 98294 6d7b52 98046->98294 98049 73cd57 98047->98049 98417 733833 75 API calls Mailbox 98049->98417 98052 73ce5d 98055 6d81a7 59 API calls 98052->98055 98053->98013 98054 6d7b52 59 API calls 98057 73ce3a 98054->98057 98056 73ce6b 98055->98056 98297 6d7c8e 98056->98297 98057->98052 98060 6d7d2c 59 API calls 98057->98060 98062 73ce4f 98060->98062 98061 6d7c8e 59 API calls 98063 73ce87 98061->98063 98064 6d7d2c 59 API calls 98062->98064 98065 6d7c8e 59 API calls 98063->98065 98064->98052 98066 73ce95 98065->98066 98067 6d9997 84 API calls 98066->98067 98068 73cea1 98067->98068 98306 7340b2 98068->98306 98070 73ceb2 98071 733c7b 3 API calls 98070->98071 98072 73cebc 98071->98072 98073 6d9997 84 API calls 98072->98073 98076 73ceed 98072->98076 98074 73ceda 98073->98074 98360 7391fe 98074->98360 98077 6d4faa 84 API calls 98076->98077 98077->98013 98079 74cbf1 130 API calls 98078->98079 98080 74e05b 98079->98080 98080->97940 98082 6d4fbb 98081->98082 98083 6d4fb4 98081->98083 98085 6d4fdb FreeLibrary 98082->98085 98086 6d4fca 98082->98086 98084 6f5516 __fcloseall 83 API calls 98083->98084 98084->98082 98085->98086 98086->97940 98947 73449b GetFileAttributesW 98087->98947 98090->97936 98091->97940 98092->97934 98093->97938 98095 6d9997 84 API calls 98094->98095 98096 74cc2e 98095->98096 98100 74cc75 Mailbox 98096->98100 98132 74d8b9 98096->98132 98098 74d042 98182 74d9dc 92 API calls Mailbox 98098->98182 98100->97997 98102 74d051 98104 74cedb 98102->98104 98105 74d05d 98102->98105 98103 74ccc6 Mailbox 98103->98100 98106 6d9997 84 API calls 98103->98106 98119 74cecd 98103->98119 98164 73f656 59 API calls 2 library calls 98103->98164 98165 74d0f3 61 API calls 2 library calls 98103->98165 98145 74ca82 98104->98145 98105->98100 98106->98103 98111 74cf14 98160 6f0d88 98111->98160 98114 74cf47 98167 6d942e 98114->98167 98115 74cf2e 98166 739ed4 89 API calls 4 library calls 98115->98166 98118 74cf39 GetCurrentProcess TerminateProcess 98118->98114 98119->98098 98119->98104 98123 74d0b8 98123->98100 98127 74d0cc FreeLibrary 98123->98127 98125 74cf7f 98179 74d75d 107 API calls _free 98125->98179 98127->98100 98131 74cf90 98131->98123 98180 6d8ea0 59 API calls Mailbox 98131->98180 98181 6d9e9c 60 API calls Mailbox 98131->98181 98183 74d75d 107 API calls _free 98131->98183 98133 6d7faf 59 API calls 98132->98133 98134 74d8d4 CharLowerBuffW 98133->98134 98184 72f479 98134->98184 98138 6d77c7 59 API calls 98139 74d90d 98138->98139 98191 6d79ab 98139->98191 98141 74d924 98142 6d7e8c 59 API calls 98141->98142 98143 74d930 Mailbox 98142->98143 98144 74d96c Mailbox 98143->98144 98204 74d0f3 61 API calls 2 library calls 98143->98204 98144->98103 98146 74ca9d 98145->98146 98150 74caf2 98145->98150 98147 6f0f36 Mailbox 59 API calls 98146->98147 98149 74cabf 98147->98149 98148 6f0f36 Mailbox 59 API calls 98148->98149 98149->98148 98149->98150 98151 74db64 98150->98151 98152 74dd8d Mailbox 98151->98152 98157 74db87 _strcat _wcscpy __wsetenvp 98151->98157 98152->98111 98153 6d9d46 59 API calls 98153->98157 98154 6d9c9c 59 API calls 98154->98157 98155 6d9cf8 59 API calls 98155->98157 98156 6f588c 58 API calls __crtLCMapStringA_stat 98156->98157 98157->98152 98157->98153 98157->98154 98157->98155 98157->98156 98158 6d9997 84 API calls 98157->98158 98208 73592e 61 API calls 2 library calls 98157->98208 98158->98157 98161 6f0d9d 98160->98161 98162 6f0e35 VirtualProtect 98161->98162 98163 6f0e03 98161->98163 98162->98163 98163->98114 98163->98115 98164->98103 98165->98103 98166->98118 98168 6d9436 98167->98168 98169 6f0f36 Mailbox 59 API calls 98168->98169 98170 6d9444 98169->98170 98171 6d9450 98170->98171 98209 6d935c 59 API calls Mailbox 98170->98209 98173 6d91b0 98171->98173 98210 6d92c0 98173->98210 98175 6f0f36 Mailbox 59 API calls 98176 6d925b 98175->98176 98176->98131 98178 6d8ea0 59 API calls Mailbox 98176->98178 98177 6d91bf 98177->98175 98177->98176 98178->98125 98179->98131 98180->98131 98181->98131 98182->98102 98183->98131 98186 72f4a4 __wsetenvp 98184->98186 98185 72f4e3 98185->98138 98185->98143 98186->98185 98187 72f4d9 98186->98187 98188 72f58a 98186->98188 98187->98185 98205 6d7a24 61 API calls 98187->98205 98188->98185 98206 6d7a24 61 API calls 98188->98206 98192 6d79ba 98191->98192 98193 6d7a17 98191->98193 98192->98193 98195 6d79c5 98192->98195 98194 6d7e8c 59 API calls 98193->98194 98201 6d79e8 _memmove 98194->98201 98196 70ee62 98195->98196 98197 6d79e0 98195->98197 98198 6d8189 59 API calls 98196->98198 98207 6d8087 59 API calls Mailbox 98197->98207 98200 70ee6c 98198->98200 98202 6f0f36 Mailbox 59 API calls 98200->98202 98201->98141 98203 70ee8c 98202->98203 98204->98144 98205->98187 98206->98188 98207->98201 98208->98157 98209->98171 98211 6d92c9 Mailbox 98210->98211 98212 70f4f8 98211->98212 98217 6d92d3 98211->98217 98214 6f0f36 Mailbox 59 API calls 98212->98214 98213 6d92da 98213->98177 98215 70f504 98214->98215 98217->98213 98218 6d9df0 59 API calls Mailbox 98217->98218 98218->98217 98418 6d4d13 98219->98418 98224 6d4f68 LoadLibraryExW 98428 6d4cc8 98224->98428 98225 70dc3f 98226 6d4faa 84 API calls 98225->98226 98228 70dc46 98226->98228 98230 6d4cc8 3 API calls 98228->98230 98232 70dc4e 98230->98232 98454 6d506b 98232->98454 98233 6d4f8f 98233->98232 98234 6d4f9b 98233->98234 98236 6d4faa 84 API calls 98234->98236 98238 6d4fa0 98236->98238 98238->98015 98238->98018 98240 70dc75 98462 6d5027 98240->98462 98244 6d77c7 59 API calls 98243->98244 98245 6d470f 98244->98245 98246 6d77c7 59 API calls 98245->98246 98247 6d4717 98246->98247 98248 6d77c7 59 API calls 98247->98248 98249 6d471f 98248->98249 98250 6d77c7 59 API calls 98249->98250 98251 6d4727 98250->98251 98252 6d475b 98251->98252 98253 70d82b 98251->98253 98254 6d79ab 59 API calls 98252->98254 98255 6d81a7 59 API calls 98253->98255 98256 6d4769 98254->98256 98257 70d834 98255->98257 98258 6d7e8c 59 API calls 98256->98258 98259 6d7eec 59 API calls 98257->98259 98260 6d4773 98258->98260 98261 6d479e 98259->98261 98260->98261 98262 6d79ab 59 API calls 98260->98262 98263 6d47de 98261->98263 98266 6d47bd 98261->98266 98276 70d854 98261->98276 98265 6d4794 98262->98265 98264 6d79ab 59 API calls 98263->98264 98267 6d47ef 98264->98267 98268 6d7e8c 59 API calls 98265->98268 98270 6d7b52 59 API calls 98266->98270 98271 6d4801 98267->98271 98274 6d81a7 59 API calls 98267->98274 98268->98261 98269 70d924 98272 6d7d2c 59 API calls 98269->98272 98273 6d47c7 98270->98273 98275 6d4811 98271->98275 98277 6d81a7 59 API calls 98271->98277 98289 70d8e1 98272->98289 98273->98263 98280 6d79ab 59 API calls 98273->98280 98274->98271 98279 6d4818 98275->98279 98281 6d81a7 59 API calls 98275->98281 98276->98269 98278 70d90d 98276->98278 98288 70d88b 98276->98288 98277->98275 98278->98269 98284 70d8f8 98278->98284 98282 6d81a7 59 API calls 98279->98282 98291 6d481f Mailbox 98279->98291 98280->98263 98281->98279 98282->98291 98283 6d7b52 59 API calls 98283->98289 98287 6d7d2c 59 API calls 98284->98287 98285 70d8e9 98286 6d7d2c 59 API calls 98285->98286 98286->98289 98287->98289 98288->98285 98292 70d8d4 98288->98292 98289->98263 98289->98283 98634 6d7a84 59 API calls 2 library calls 98289->98634 98291->98046 98293 6d7d2c 59 API calls 98292->98293 98293->98289 98295 6d7faf 59 API calls 98294->98295 98296 6d7b5d 98295->98296 98296->98052 98296->98054 98298 70efc4 98297->98298 98299 6d7ca0 98297->98299 98641 727f03 59 API calls _memmove 98298->98641 98635 6d7bb1 98299->98635 98302 70efce 98304 6d81a7 59 API calls 98302->98304 98303 6d7cac 98303->98061 98305 70efd6 Mailbox 98304->98305 98307 7340ce 98306->98307 98308 7340d3 98307->98308 98309 7340e1 98307->98309 98311 6d81a7 59 API calls 98308->98311 98310 6d77c7 59 API calls 98309->98310 98312 7340e9 98310->98312 98313 7340dc Mailbox 98311->98313 98314 6d77c7 59 API calls 98312->98314 98313->98070 98315 7340f1 98314->98315 98316 6d77c7 59 API calls 98315->98316 98317 7340fc 98316->98317 98318 6d77c7 59 API calls 98317->98318 98319 734104 98318->98319 98320 6d77c7 59 API calls 98319->98320 98321 73410c 98320->98321 98322 6d77c7 59 API calls 98321->98322 98323 734114 98322->98323 98324 6d77c7 59 API calls 98323->98324 98325 73411c 98324->98325 98326 6d77c7 59 API calls 98325->98326 98327 734124 98326->98327 98328 6d46f9 59 API calls 98327->98328 98329 73413b 98328->98329 98330 6d46f9 59 API calls 98329->98330 98331 734154 98330->98331 98332 6d7b52 59 API calls 98331->98332 98333 734160 98332->98333 98334 734173 98333->98334 98335 6d7e8c 59 API calls 98333->98335 98336 6d7b52 59 API calls 98334->98336 98335->98334 98337 73417c 98336->98337 98338 73418c 98337->98338 98339 6d7e8c 59 API calls 98337->98339 98340 6d81a7 59 API calls 98338->98340 98339->98338 98341 734198 98340->98341 98342 6d7c8e 59 API calls 98341->98342 98343 7341a4 98342->98343 98642 734264 59 API calls 98343->98642 98345 7341b3 98643 734264 59 API calls 98345->98643 98347 7341c6 98348 6d7b52 59 API calls 98347->98348 98349 7341d0 98348->98349 98350 7341e7 98349->98350 98351 7341d5 98349->98351 98353 6d7b52 59 API calls 98350->98353 98352 6d7e0b 59 API calls 98351->98352 98354 7341e2 98352->98354 98355 7341f0 98353->98355 98358 6d7c8e 59 API calls 98354->98358 98356 73420e 98355->98356 98357 6d7e0b 59 API calls 98355->98357 98359 6d7c8e 59 API calls 98356->98359 98357->98354 98358->98356 98359->98313 98361 73920b __ftell_nolock 98360->98361 98362 6f0f36 Mailbox 59 API calls 98361->98362 98363 739268 98362->98363 98364 6d538e 59 API calls 98363->98364 98365 739272 98364->98365 98366 739008 GetSystemTimeAsFileTime 98365->98366 98367 73927d 98366->98367 98368 6d5045 85 API calls 98367->98368 98369 739290 _wcscmp 98368->98369 98370 739361 98369->98370 98371 7392b4 98369->98371 98372 7397dd 96 API calls 98370->98372 98674 7397dd 98371->98674 98388 73932d _wcscat 98372->98388 98376 6d506b 74 API calls 98377 739386 98376->98377 98379 6d506b 74 API calls 98377->98379 98378 73936a 98378->98076 98381 739396 98379->98381 98380 7392e2 _wcscat _wcscpy 98681 6f426e 58 API calls __wsplitpath_helper 98380->98681 98382 6d506b 74 API calls 98381->98382 98384 7393b1 98382->98384 98385 6d506b 74 API calls 98384->98385 98386 7393c1 98385->98386 98387 6d506b 74 API calls 98386->98387 98389 7393dc 98387->98389 98388->98376 98388->98378 98390 6d506b 74 API calls 98389->98390 98391 7393ec 98390->98391 98392 6d506b 74 API calls 98391->98392 98393 7393fc 98392->98393 98394 6d506b 74 API calls 98393->98394 98395 73940c 98394->98395 98644 73998c GetTempPathW GetTempFileNameW 98395->98644 98397 739418 98398 6f53cb 115 API calls 98397->98398 98408 739429 98398->98408 98399 7394e3 98658 6f5516 98399->98658 98401 7394ee 98403 7394f4 DeleteFileW 98401->98403 98404 739508 98401->98404 98402 6d506b 74 API calls 98402->98408 98403->98378 98405 7395ae CopyFileW 98404->98405 98410 739512 _wcsncpy 98404->98410 98406 7395d6 DeleteFileW 98405->98406 98407 7395c4 DeleteFileW 98405->98407 98671 73994b CreateFileW 98406->98671 98407->98378 98408->98378 98408->98399 98408->98402 98645 6f49d3 98408->98645 98682 738baf 116 API calls __fcloseall 98410->98682 98413 739599 98413->98406 98414 73959d DeleteFileW 98413->98414 98414->98378 98415->98003 98416->98041 98417->98053 98467 6d4d61 98418->98467 98421 6d4d3a 98422 6d4d4a FreeLibrary 98421->98422 98423 6d4d53 98421->98423 98422->98423 98425 6f53cb 98423->98425 98424 6d4d61 2 API calls 98424->98421 98471 6f53e0 98425->98471 98427 6d4f5c 98427->98224 98427->98225 98552 6d4d94 98428->98552 98431 6d4ced 98432 6d4cff FreeLibrary 98431->98432 98433 6d4d08 98431->98433 98432->98433 98435 6d4dd0 98433->98435 98434 6d4d94 2 API calls 98434->98431 98436 6f0f36 Mailbox 59 API calls 98435->98436 98437 6d4de5 98436->98437 98438 6d538e 59 API calls 98437->98438 98439 6d4df1 _memmove 98438->98439 98440 6d4ee9 98439->98440 98441 6d4f21 98439->98441 98445 6d4e2c 98439->98445 98556 6d4fe9 CreateStreamOnHGlobal 98440->98556 98567 7399c4 95 API calls 98441->98567 98442 6d5027 69 API calls 98451 6d4e35 98442->98451 98445->98442 98446 6d506b 74 API calls 98446->98451 98447 6d4ec9 98447->98233 98449 70dc00 98450 6d5045 85 API calls 98449->98450 98452 70dc14 98450->98452 98451->98446 98451->98447 98451->98449 98562 6d5045 98451->98562 98453 6d506b 74 API calls 98452->98453 98453->98447 98455 6d507d 98454->98455 98456 70dd26 98454->98456 98591 6f5752 98455->98591 98459 7391b2 98611 739008 98459->98611 98461 7391c8 98461->98240 98463 70dce9 98462->98463 98464 6d5036 98462->98464 98616 6f5dd0 98464->98616 98466 6d503e 98468 6d4d2e 98467->98468 98469 6d4d6a LoadLibraryA 98467->98469 98468->98421 98468->98424 98469->98468 98470 6d4d7b GetProcAddress 98469->98470 98470->98468 98473 6f53ec _fseek 98471->98473 98472 6f53ff 98520 6f8ca8 58 API calls __getptd_noexit 98472->98520 98473->98472 98475 6f5430 98473->98475 98490 700668 98475->98490 98476 6f5404 98521 6f8f36 9 API calls _fseek 98476->98521 98479 6f5435 98480 6f543e 98479->98480 98481 6f544b 98479->98481 98522 6f8ca8 58 API calls __getptd_noexit 98480->98522 98483 6f5475 98481->98483 98484 6f5455 98481->98484 98505 700787 98483->98505 98523 6f8ca8 58 API calls __getptd_noexit 98484->98523 98485 6f540f _fseek @_EH4_CallFilterFunc@8 98485->98427 98491 700674 _fseek 98490->98491 98492 6f9d8b __lock 58 API calls 98491->98492 98493 700682 98492->98493 98494 7006fd 98493->98494 98500 6f9e13 __mtinitlocknum 58 API calls 98493->98500 98503 7006f6 98493->98503 98528 6f6dcd 59 API calls __lock 98493->98528 98529 6f6e37 LeaveCriticalSection LeaveCriticalSection _doexit 98493->98529 98530 6f899d 58 API calls 2 library calls 98494->98530 98497 700773 _fseek 98497->98479 98498 700704 98498->98503 98531 6f9fab InitializeCriticalSectionAndSpinCount 98498->98531 98500->98493 98502 70072a EnterCriticalSection 98502->98503 98525 70077e 98503->98525 98514 7007a7 __wopenfile 98505->98514 98506 7007c1 98536 6f8ca8 58 API calls __getptd_noexit 98506->98536 98508 70097c 98508->98506 98512 7009df 98508->98512 98509 7007c6 98537 6f8f36 9 API calls _fseek 98509->98537 98511 6f5480 98524 6f54a2 LeaveCriticalSection LeaveCriticalSection _fseek 98511->98524 98533 708721 98512->98533 98514->98506 98514->98508 98514->98514 98538 6f394b 60 API calls 2 library calls 98514->98538 98516 700975 98516->98508 98539 6f394b 60 API calls 2 library calls 98516->98539 98518 700994 98518->98508 98540 6f394b 60 API calls 2 library calls 98518->98540 98520->98476 98521->98485 98522->98485 98523->98485 98524->98485 98532 6f9ef5 LeaveCriticalSection 98525->98532 98527 700785 98527->98497 98528->98493 98529->98493 98530->98498 98531->98502 98532->98527 98541 707f05 98533->98541 98535 70873a 98535->98511 98536->98509 98537->98511 98538->98516 98539->98518 98540->98508 98542 707f11 _fseek 98541->98542 98543 707f27 98542->98543 98546 707f5d 98542->98546 98544 6f8ca8 _fseek 58 API calls 98543->98544 98545 707f2c 98544->98545 98547 6f8f36 _fseek 9 API calls 98545->98547 98548 707fce __wsopen_nolock 109 API calls 98546->98548 98551 707f36 _fseek 98547->98551 98549 707f79 98548->98549 98550 707fa2 __wsopen_helper LeaveCriticalSection 98549->98550 98550->98551 98551->98535 98553 6d4ce1 98552->98553 98554 6d4d9d LoadLibraryA 98552->98554 98553->98431 98553->98434 98554->98553 98555 6d4dae GetProcAddress 98554->98555 98555->98553 98557 6d5020 98556->98557 98558 6d5003 FindResourceExW 98556->98558 98557->98445 98558->98557 98559 70dc8c LoadResource 98558->98559 98559->98557 98560 70dca1 SizeofResource 98559->98560 98560->98557 98561 70dcb5 LockResource 98560->98561 98561->98557 98563 70dd04 98562->98563 98564 6d5054 98562->98564 98568 6f59bd 98564->98568 98566 6d5062 98566->98451 98567->98445 98571 6f59c9 _fseek 98568->98571 98569 6f59db 98581 6f8ca8 58 API calls __getptd_noexit 98569->98581 98571->98569 98572 6f5a01 98571->98572 98583 6f6d8e 98572->98583 98574 6f59e0 98582 6f8f36 9 API calls _fseek 98574->98582 98578 6f5a16 98590 6f5a38 LeaveCriticalSection LeaveCriticalSection _fseek 98578->98590 98580 6f59eb _fseek 98580->98566 98581->98574 98582->98580 98584 6f6d9e 98583->98584 98585 6f6dc0 EnterCriticalSection 98583->98585 98584->98585 98586 6f6da6 98584->98586 98587 6f5a07 98585->98587 98588 6f9d8b __lock 58 API calls 98586->98588 98589 6f592e 83 API calls 4 library calls 98587->98589 98588->98587 98589->98578 98590->98580 98594 6f576d 98591->98594 98593 6d508e 98593->98459 98595 6f5779 _fseek 98594->98595 98596 6f578f _memset 98595->98596 98597 6f57bc 98595->98597 98598 6f57b4 _fseek 98595->98598 98607 6f8ca8 58 API calls __getptd_noexit 98596->98607 98599 6f6d8e __lock_file 59 API calls 98597->98599 98598->98593 98601 6f57c2 98599->98601 98609 6f558d 72 API calls 6 library calls 98601->98609 98602 6f57a9 98608 6f8f36 9 API calls _fseek 98602->98608 98605 6f57d8 98610 6f57f6 LeaveCriticalSection LeaveCriticalSection _fseek 98605->98610 98607->98602 98608->98598 98609->98605 98610->98598 98614 6f537a GetSystemTimeAsFileTime 98611->98614 98613 739017 98613->98461 98615 6f53a8 __aulldiv 98614->98615 98615->98613 98617 6f5ddc _fseek 98616->98617 98618 6f5dee 98617->98618 98619 6f5e03 98617->98619 98630 6f8ca8 58 API calls __getptd_noexit 98618->98630 98621 6f6d8e __lock_file 59 API calls 98619->98621 98623 6f5e09 98621->98623 98622 6f5df3 98631 6f8f36 9 API calls _fseek 98622->98631 98632 6f5a40 67 API calls 6 library calls 98623->98632 98626 6f5e14 98633 6f5e34 LeaveCriticalSection LeaveCriticalSection _fseek 98626->98633 98628 6f5e26 98629 6f5dfe _fseek 98628->98629 98629->98466 98630->98622 98631->98629 98632->98626 98633->98628 98634->98289 98636 6d7bbf 98635->98636 98637 6d7be5 _memmove 98635->98637 98636->98637 98638 6f0f36 Mailbox 59 API calls 98636->98638 98637->98303 98639 6d7c34 98638->98639 98640 6f0f36 Mailbox 59 API calls 98639->98640 98640->98637 98641->98302 98642->98345 98643->98347 98644->98397 98646 6f49df _fseek 98645->98646 98647 6f49fd 98646->98647 98648 6f4a15 98646->98648 98649 6f4a0d _fseek 98646->98649 98695 6f8ca8 58 API calls __getptd_noexit 98647->98695 98650 6f6d8e __lock_file 59 API calls 98648->98650 98649->98408 98652 6f4a1b 98650->98652 98683 6f487a 98652->98683 98653 6f4a02 98696 6f8f36 9 API calls _fseek 98653->98696 98659 6f5522 _fseek 98658->98659 98660 6f554e 98659->98660 98661 6f5536 98659->98661 98664 6f6d8e __lock_file 59 API calls 98660->98664 98667 6f5546 _fseek 98660->98667 98874 6f8ca8 58 API calls __getptd_noexit 98661->98874 98663 6f553b 98875 6f8f36 9 API calls _fseek 98663->98875 98666 6f5560 98664->98666 98858 6f54aa 98666->98858 98667->98401 98672 739971 SetFileTime CloseHandle 98671->98672 98673 739987 98671->98673 98672->98673 98673->98378 98675 7397f1 __tzset_nolock _wcscmp 98674->98675 98676 7392b9 98675->98676 98677 6d506b 74 API calls 98675->98677 98678 7391b2 GetSystemTimeAsFileTime 98675->98678 98679 6d5045 85 API calls 98675->98679 98676->98378 98680 6f426e 58 API calls __wsplitpath_helper 98676->98680 98677->98675 98678->98675 98679->98675 98680->98380 98681->98388 98682->98413 98684 6f48a7 98683->98684 98687 6f4889 98683->98687 98697 6f4a4d LeaveCriticalSection LeaveCriticalSection _fseek 98684->98697 98685 6f4897 98733 6f8ca8 58 API calls __getptd_noexit 98685->98733 98687->98684 98687->98685 98689 6f48c1 _memmove 98687->98689 98688 6f489c 98734 6f8f36 9 API calls _fseek 98688->98734 98689->98684 98698 6f4856 98689->98698 98705 6fda06 98689->98705 98735 6f4bad 98689->98735 98741 6faf9e 78 API calls 7 library calls 98689->98741 98695->98653 98696->98649 98697->98649 98699 6f4875 98698->98699 98700 6f4860 98698->98700 98699->98689 98742 6f8ca8 58 API calls __getptd_noexit 98700->98742 98702 6f4865 98743 6f8f36 9 API calls _fseek 98702->98743 98704 6f4870 98704->98689 98706 6fda12 _fseek 98705->98706 98707 6fda1f 98706->98707 98708 6fda36 98706->98708 98817 6f8c74 58 API calls __getptd_noexit 98707->98817 98710 6fdad5 98708->98710 98713 6fda4a 98708->98713 98823 6f8c74 58 API calls __getptd_noexit 98710->98823 98712 6fda24 98818 6f8ca8 58 API calls __getptd_noexit 98712->98818 98714 6fda68 98713->98714 98715 6fda72 98713->98715 98819 6f8c74 58 API calls __getptd_noexit 98714->98819 98744 6fd386 98715->98744 98716 6fda6d 98824 6f8ca8 58 API calls __getptd_noexit 98716->98824 98720 6fda78 98722 6fda9e 98720->98722 98723 6fda8b 98720->98723 98820 6f8ca8 58 API calls __getptd_noexit 98722->98820 98753 6fdaf5 98723->98753 98724 6fdae1 98825 6f8f36 9 API calls _fseek 98724->98825 98728 6fda2b _fseek 98728->98689 98729 6fda97 98822 6fdacd LeaveCriticalSection __unlock_fhandle 98729->98822 98730 6fdaa3 98821 6f8c74 58 API calls __getptd_noexit 98730->98821 98733->98688 98734->98684 98736 6f4bc0 98735->98736 98740 6f4be4 98735->98740 98737 6f4856 __flush 58 API calls 98736->98737 98736->98740 98738 6f4bdd 98737->98738 98739 6fda06 __write 78 API calls 98738->98739 98739->98740 98740->98689 98741->98689 98742->98702 98743->98704 98745 6fd392 _fseek 98744->98745 98746 6fd3e1 EnterCriticalSection 98745->98746 98748 6f9d8b __lock 58 API calls 98745->98748 98747 6fd407 _fseek 98746->98747 98747->98720 98749 6fd3b7 98748->98749 98752 6fd3cf 98749->98752 98826 6f9fab InitializeCriticalSectionAndSpinCount 98749->98826 98827 6fd40b LeaveCriticalSection _doexit 98752->98827 98754 6fdb02 __ftell_nolock 98753->98754 98755 6fdb41 98754->98755 98756 6fdb60 98754->98756 98781 6fdb36 98754->98781 98837 6f8c74 58 API calls __getptd_noexit 98755->98837 98759 6fdbb8 98756->98759 98760 6fdb9c 98756->98760 98764 6fdbd1 98759->98764 98843 701a41 60 API calls 3 library calls 98759->98843 98840 6f8c74 58 API calls __getptd_noexit 98760->98840 98761 6fe356 98761->98729 98762 6fdb46 98838 6f8ca8 58 API calls __getptd_noexit 98762->98838 98828 705deb 98764->98828 98766 6fdba1 98841 6f8ca8 58 API calls __getptd_noexit 98766->98841 98768 6fdb4d 98839 6f8f36 9 API calls _fseek 98768->98839 98772 6fdbdf 98773 6fdf38 98772->98773 98844 6f9b2c 58 API calls 2 library calls 98772->98844 98774 6fdba8 98842 6f8f36 9 API calls _fseek 98774->98842 98851 6fc776 98781->98851 98817->98712 98818->98728 98819->98716 98820->98730 98821->98729 98822->98728 98823->98716 98824->98724 98825->98728 98826->98752 98827->98746 98829 705e03 98828->98829 98830 705df6 98828->98830 98832 705e0f 98829->98832 98833 6f8ca8 _fseek 58 API calls 98829->98833 98831 6f8ca8 _fseek 58 API calls 98830->98831 98834 705dfb 98831->98834 98832->98772 98835 705e30 98833->98835 98834->98772 98836 6f8f36 _fseek 9 API calls 98835->98836 98836->98834 98837->98762 98838->98768 98839->98781 98840->98766 98841->98774 98842->98781 98843->98764 98852 6fc77e 98851->98852 98853 6fc780 IsProcessorFeaturePresent 98851->98853 98852->98761 98855 705a8a 98853->98855 98856 705a39 ___raise_securityfailure 5 API calls 98855->98856 98857 705b6d 98856->98857 98857->98761 98859 6f54cd 98858->98859 98860 6f54b9 98858->98860 98862 6f54c9 98859->98862 98864 6f4bad __flush 78 API calls 98859->98864 98907 6f8ca8 58 API calls __getptd_noexit 98860->98907 98876 6f5585 LeaveCriticalSection LeaveCriticalSection _fseek 98862->98876 98863 6f54be 98908 6f8f36 9 API calls _fseek 98863->98908 98866 6f54d9 98864->98866 98877 700cf7 98866->98877 98869 6f4856 __flush 58 API calls 98870 6f54e7 98869->98870 98881 700b82 98870->98881 98872 6f54ed 98872->98862 98873 6f2ed5 _free 58 API calls 98872->98873 98873->98862 98874->98663 98875->98667 98876->98667 98878 6f54e1 98877->98878 98879 700d04 98877->98879 98878->98869 98879->98878 98880 6f2ed5 _free 58 API calls 98879->98880 98880->98878 98882 700b8e _fseek 98881->98882 98883 700bb2 98882->98883 98884 700b9b 98882->98884 98886 700c3d 98883->98886 98887 700bc2 98883->98887 98924 6f8c74 58 API calls __getptd_noexit 98884->98924 98929 6f8c74 58 API calls __getptd_noexit 98886->98929 98890 700be0 98887->98890 98891 700bea 98887->98891 98889 700ba0 98925 6f8ca8 58 API calls __getptd_noexit 98889->98925 98926 6f8c74 58 API calls __getptd_noexit 98890->98926 98895 6fd386 ___lock_fhandle 59 API calls 98891->98895 98892 700be5 98930 6f8ca8 58 API calls __getptd_noexit 98892->98930 98898 700bf0 98895->98898 98896 700ba7 _fseek 98896->98872 98900 700c03 98898->98900 98901 700c0e 98898->98901 98899 700c49 98931 6f8f36 9 API calls _fseek 98899->98931 98909 700c5d 98900->98909 98927 6f8ca8 58 API calls __getptd_noexit 98901->98927 98905 700c09 98928 700c35 LeaveCriticalSection __unlock_fhandle 98905->98928 98907->98863 98908->98862 98932 6fd643 98909->98932 98911 700cc1 98913 700c6b 98913->98911 98914 700c9f 98913->98914 98915 6fd643 __chsize_nolock 58 API calls 98913->98915 98914->98911 98916 6fd643 __chsize_nolock 58 API calls 98914->98916 98918 700c96 98915->98918 98924->98889 98925->98896 98926->98892 98927->98905 98928->98896 98929->98892 98930->98899 98931->98896 98933 6fd64e 98932->98933 98934 6fd663 98932->98934 98935 6f8c74 __chsize_nolock 58 API calls 98933->98935 98936 6f8c74 __chsize_nolock 58 API calls 98934->98936 98938 6fd688 98934->98938 98937 6fd653 98935->98937 98939 6fd692 98936->98939 98940 6f8ca8 _fseek 58 API calls 98937->98940 98938->98913 98941 6f8ca8 _fseek 58 API calls 98939->98941 98943 6fd69a 98941->98943 98948 733c82 98947->98948 98949 7344b6 FindFirstFileW 98947->98949 98948->97940 98949->98948 98950 7344cb FindClose 98949->98950 98950->98948 98951->97964 98952->97959 98953->97880 98954 710155 98961 6dade2 Mailbox 98954->98961 98955 6db6c1 98997 739ed4 89 API calls 4 library calls 98955->98997 98957 710bb5 98998 7263f2 59 API calls Mailbox 98957->98998 98959 710bbe 98961->98955 98961->98957 98961->98959 98965 752343 98961->98965 98994 6d9df0 59 API calls Mailbox 98961->98994 98995 6d8e34 59 API calls Mailbox 98961->98995 98996 7271e5 59 API calls 98961->98996 98966 6d9997 84 API calls 98965->98966 98967 75235d 98966->98967 98999 6d7b76 98967->98999 98970 75239a 99004 6e5bfd 98970->99004 98973 75237d 98973->98970 98975 752382 98973->98975 98977 6d81a7 59 API calls 98975->98977 98976 6d7f41 59 API calls 98978 7523b1 98976->98978 98981 75238c Mailbox 98977->98981 99007 6e5c72 98978->99007 98980 7523c0 Mailbox 99016 6e5d24 98980->99016 99030 6d9b9c 59 API calls Mailbox 98981->99030 98985 752474 Mailbox 98985->98961 98986 6d77c7 59 API calls 98989 7523f2 98986->98989 98987 752429 98990 6d7c8e 59 API calls 98987->98990 98992 752443 Mailbox 98987->98992 98989->98987 98991 6d3f84 59 API calls 98989->98991 99019 726511 98989->99019 98990->98987 98991->98989 99026 6e5c2e 98992->99026 98994->98961 98995->98961 98996->98961 98997->98957 98998->98959 99000 6f0f36 Mailbox 59 API calls 98999->99000 99001 6d7b9b 99000->99001 99002 6d8189 59 API calls 99001->99002 99003 6d7baa 99002->99003 99003->98970 99025 6d9c9c 59 API calls 99003->99025 99005 6d77c7 59 API calls 99004->99005 99006 6e5c05 99005->99006 99006->98976 99008 6e5c2e 59 API calls 99007->99008 99009 6e5c80 99008->99009 99015 6e5c8f 99009->99015 99031 6e6841 61 API calls 2 library calls 99009->99031 99011 6f0f36 Mailbox 59 API calls 99013 6e5cb9 99011->99013 99012 6e5cdc 99012->99013 99032 6e5d92 59 API calls Mailbox 99012->99032 99013->98980 99015->99011 99017 6d81a7 59 API calls 99016->99017 99018 6e5d32 99017->99018 99018->98986 99020 72652a 99019->99020 99021 72651c 99019->99021 99033 6d78ad 99020->99033 99022 6d7e8c 59 API calls 99021->99022 99024 726528 99022->99024 99024->98989 99025->98973 99027 6e5c38 99026->99027 99028 6d7eec 59 API calls 99027->99028 99029 6e5c53 99028->99029 99029->98981 99030->98985 99031->99012 99032->99015 99034 6d78bc 99033->99034 99035 6d792f 99033->99035 99034->99035 99037 6d78c8 99034->99037 99036 6d7e8c 59 API calls 99035->99036 99042 6d78da _memmove 99036->99042 99038 6d7900 99037->99038 99039 6d78d2 99037->99039 99041 6d8189 59 API calls 99038->99041 99045 6d8087 59 API calls Mailbox 99039->99045 99043 6d790a 99041->99043 99042->99024 99044 6f0f36 Mailbox 59 API calls 99043->99044 99044->99042 99045->99042 99046 738db6 99047 738dc3 99046->99047 99048 738dc9 99046->99048 99049 6f2ed5 _free 58 API calls 99047->99049 99050 738dda 99048->99050 99051 6f2ed5 _free 58 API calls 99048->99051 99049->99048 99052 738dec 99050->99052 99053 6f2ed5 _free 58 API calls 99050->99053 99051->99050 99053->99052 99054 6d1055 99059 6d2649 99054->99059 99057 6f2ec0 __cinit 67 API calls 99058 6d1064 99057->99058 99060 6d77c7 59 API calls 99059->99060 99061 6d26b7 99060->99061 99067 6d3582 99061->99067 99063 70c1e9 99065 6d2754 99065->99063 99066 6d105a 99065->99066 99070 6d3416 59 API calls 2 library calls 99065->99070 99066->99057 99071 6d35b0 99067->99071 99070->99065 99072 6d35bd 99071->99072 99073 6d35a1 99071->99073 99072->99073 99074 6d35c4 RegOpenKeyExW 99072->99074 99073->99065 99074->99073 99075 6d35de RegQueryValueExW 99074->99075 99076 6d35ff 99075->99076 99077 6d3614 RegCloseKey 99075->99077 99076->99077 99077->99073 99078 6d1066 99083 6df8cf 99078->99083 99080 6d106c 99081 6f2ec0 __cinit 67 API calls 99080->99081 99082 6d1076 99081->99082 99084 6df8f0 99083->99084 99116 6f0083 99084->99116 99088 6df937 99089 6d77c7 59 API calls 99088->99089 99090 6df941 99089->99090 99091 6d77c7 59 API calls 99090->99091 99092 6df94b 99091->99092 99093 6d77c7 59 API calls 99092->99093 99094 6df955 99093->99094 99095 6d77c7 59 API calls 99094->99095 99096 6df993 99095->99096 99097 6d77c7 59 API calls 99096->99097 99098 6dfa5e 99097->99098 99126 6e60e7 99098->99126 99102 6dfa90 99103 6d77c7 59 API calls 99102->99103 99104 6dfa9a 99103->99104 99154 6eff1e 99104->99154 99106 6dfae1 99107 6dfaf1 GetStdHandle 99106->99107 99108 6dfb3d 99107->99108 99109 714904 99107->99109 99110 6dfb45 OleInitialize 99108->99110 99109->99108 99111 71490d 99109->99111 99110->99080 99161 736be1 64 API calls Mailbox 99111->99161 99113 714914 99162 7372b0 CreateThread 99113->99162 99115 714920 CloseHandle 99115->99110 99163 6f015c 99116->99163 99119 6f015c 59 API calls 99120 6f00c5 99119->99120 99121 6d77c7 59 API calls 99120->99121 99122 6f00d1 99121->99122 99123 6d7d2c 59 API calls 99122->99123 99124 6df8f6 99123->99124 99125 6f02e2 6 API calls 99124->99125 99125->99088 99127 6d77c7 59 API calls 99126->99127 99128 6e60f7 99127->99128 99129 6d77c7 59 API calls 99128->99129 99130 6e60ff 99129->99130 99131 6e5bfd 59 API calls 99130->99131 99132 6e6107 99131->99132 99133 6e5bfd 59 API calls 99132->99133 99134 6e610f 99133->99134 99135 6d77c7 59 API calls 99134->99135 99136 6e611a 99135->99136 99137 6f0f36 Mailbox 59 API calls 99136->99137 99138 6dfa68 99137->99138 99139 6e6259 99138->99139 99140 6e6267 99139->99140 99141 6d77c7 59 API calls 99140->99141 99142 6e6272 99141->99142 99143 6d77c7 59 API calls 99142->99143 99144 6e627d 99143->99144 99145 6d77c7 59 API calls 99144->99145 99146 6e6288 99145->99146 99147 6d77c7 59 API calls 99146->99147 99148 6e6293 99147->99148 99149 6e5bfd 59 API calls 99148->99149 99150 6e629e 99149->99150 99151 6f0f36 Mailbox 59 API calls 99150->99151 99152 6e62a5 RegisterWindowMessageW 99151->99152 99152->99102 99155 6eff2e 99154->99155 99156 725ac5 99154->99156 99157 6f0f36 Mailbox 59 API calls 99155->99157 99170 739b90 60 API calls 99156->99170 99159 6eff36 99157->99159 99159->99106 99160 725ad0 99161->99113 99162->99115 99171 737296 65 API calls 99162->99171 99164 6d77c7 59 API calls 99163->99164 99165 6f0167 99164->99165 99166 6d77c7 59 API calls 99165->99166 99167 6f016f 99166->99167 99168 6d77c7 59 API calls 99167->99168 99169 6f00bb 99168->99169 99169->99119 99170->99160 99172 6d1016 99177 6d4ad2 99172->99177 99175 6f2ec0 __cinit 67 API calls 99176 6d1025 99175->99176 99178 6f0f36 Mailbox 59 API calls 99177->99178 99179 6d4ada 99178->99179 99181 6d101b 99179->99181 99184 6d4a94 99179->99184 99181->99175 99185 6d4a9d 99184->99185 99186 6d4aaf 99184->99186 99187 6f2ec0 __cinit 67 API calls 99185->99187 99188 6d4afe 99186->99188 99187->99186 99189 6d77c7 59 API calls 99188->99189 99190 6d4b16 GetVersionExW 99189->99190 99191 6d7d2c 59 API calls 99190->99191 99194 6d4b59 99191->99194 99192 6d7e8c 59 API calls 99193 6d4b7a 99192->99193 99195 6d7886 59 API calls 99193->99195 99194->99192 99202 6d4b86 99194->99202 99195->99202 99196 6d4bf1 GetCurrentProcess IsWow64Process 99197 6d4c0a 99196->99197 99199 6d4c89 GetSystemInfo 99197->99199 99200 6d4c20 99197->99200 99198 70dbbd 99201 6d4c56 99199->99201 99212 6d4c95 99200->99212 99201->99181 99202->99196 99202->99198 99205 6d4c7d GetSystemInfo 99207 6d4c47 99205->99207 99206 6d4c32 99208 6d4c95 2 API calls 99206->99208 99207->99201 99209 6d4c4d FreeLibrary 99207->99209 99210 6d4c3a GetNativeSystemInfo 99208->99210 99209->99201 99210->99207 99213 6d4c2e 99212->99213 99214 6d4c9e LoadLibraryA 99212->99214 99213->99205 99213->99206 99214->99213 99215 6d4caf GetProcAddress 99214->99215 99215->99213 99216 6f7dd3 99217 6f7ddf _fseek 99216->99217 99253 6f9f88 GetStartupInfoW 99217->99253 99220 6f7de4 99255 6f8cfc GetProcessHeap 99220->99255 99221 6f7e3c 99222 6f7e47 99221->99222 99338 6f7f23 58 API calls 3 library calls 99221->99338 99256 6f9c66 99222->99256 99225 6f7e4d 99227 6f7e58 __RTC_Initialize 99225->99227 99339 6f7f23 58 API calls 3 library calls 99225->99339 99277 6fd752 99227->99277 99229 6f7e67 99230 6f7e73 GetCommandLineW 99229->99230 99340 6f7f23 58 API calls 3 library calls 99229->99340 99296 7050a3 GetEnvironmentStringsW 99230->99296 99234 6f7e72 99234->99230 99236 6f7e8d 99237 6f7e98 99236->99237 99341 6f3235 58 API calls 3 library calls 99236->99341 99306 704ed8 99237->99306 99240 6f7e9e 99241 6f7ea9 99240->99241 99342 6f3235 58 API calls 3 library calls 99240->99342 99320 6f326f 99241->99320 99244 6f7eb1 99245 6f7ebc __wwincmdln 99244->99245 99343 6f3235 58 API calls 3 library calls 99244->99343 99326 6d492e 99245->99326 99248 6f7ed0 99249 6f7edf 99248->99249 99344 6f34d8 58 API calls _doexit 99248->99344 99345 6f3260 58 API calls _doexit 99249->99345 99252 6f7ee4 _fseek 99254 6f9f9e 99253->99254 99254->99220 99255->99221 99346 6f3307 36 API calls 2 library calls 99256->99346 99258 6f9c6b 99347 6f9ebc InitializeCriticalSectionAndSpinCount __getstream 99258->99347 99260 6f9c70 99261 6f9c74 99260->99261 99349 6f9f0a TlsAlloc 99260->99349 99348 6f9cdc 61 API calls 2 library calls 99261->99348 99264 6f9c79 99264->99225 99265 6f9c86 99265->99261 99266 6f9c91 99265->99266 99350 6f8955 99266->99350 99269 6f9cd3 99358 6f9cdc 61 API calls 2 library calls 99269->99358 99272 6f9cb2 99272->99269 99274 6f9cb8 99272->99274 99273 6f9cd8 99273->99225 99357 6f9bb3 58 API calls 4 library calls 99274->99357 99276 6f9cc0 GetCurrentThreadId 99276->99225 99278 6fd75e _fseek 99277->99278 99279 6f9d8b __lock 58 API calls 99278->99279 99280 6fd765 99279->99280 99281 6f8955 __calloc_crt 58 API calls 99280->99281 99284 6fd776 99281->99284 99282 6fd781 _fseek @_EH4_CallFilterFunc@8 99282->99229 99283 6fd7e1 GetStartupInfoW 99290 6fd7f6 99283->99290 99291 6fd925 99283->99291 99284->99282 99284->99283 99285 6fd9ed 99372 6fd9fd LeaveCriticalSection _doexit 99285->99372 99287 6f8955 __calloc_crt 58 API calls 99287->99290 99288 6fd972 GetStdHandle 99288->99291 99289 6fd985 GetFileType 99289->99291 99290->99287 99290->99291 99293 6fd844 99290->99293 99291->99285 99291->99288 99291->99289 99371 6f9fab InitializeCriticalSectionAndSpinCount 99291->99371 99292 6fd878 GetFileType 99292->99293 99293->99291 99293->99292 99370 6f9fab InitializeCriticalSectionAndSpinCount 99293->99370 99297 7050b4 99296->99297 99298 6f7e83 99296->99298 99373 6f899d 58 API calls 2 library calls 99297->99373 99302 704c9b GetModuleFileNameW 99298->99302 99300 7050da _memmove 99301 7050f0 FreeEnvironmentStringsW 99300->99301 99301->99298 99303 704ccf _wparse_cmdline 99302->99303 99305 704d0f _wparse_cmdline 99303->99305 99374 6f899d 58 API calls 2 library calls 99303->99374 99305->99236 99307 704ef1 __wsetenvp 99306->99307 99311 704ee9 99306->99311 99308 6f8955 __calloc_crt 58 API calls 99307->99308 99316 704f1a __wsetenvp 99308->99316 99309 704f71 99310 6f2ed5 _free 58 API calls 99309->99310 99310->99311 99311->99240 99312 6f8955 __calloc_crt 58 API calls 99312->99316 99313 704f96 99314 6f2ed5 _free 58 API calls 99313->99314 99314->99311 99316->99309 99316->99311 99316->99312 99316->99313 99317 704fad 99316->99317 99375 704787 58 API calls _fseek 99316->99375 99376 6f8f46 IsProcessorFeaturePresent 99317->99376 99319 704fb9 99319->99240 99322 6f327b __IsNonwritableInCurrentImage 99320->99322 99391 6fa651 99322->99391 99323 6f3299 __initterm_e 99324 6f2ec0 __cinit 67 API calls 99323->99324 99325 6f32b8 _doexit __IsNonwritableInCurrentImage 99323->99325 99324->99325 99325->99244 99327 6d49e7 99326->99327 99328 6d4948 99326->99328 99327->99248 99329 6d4982 IsThemeActive 99328->99329 99394 6f34ec 99329->99394 99333 6d49ae 99406 6d4a5b SystemParametersInfoW SystemParametersInfoW 99333->99406 99335 6d49ba 99407 6d3b4c 99335->99407 99337 6d49c2 SystemParametersInfoW 99337->99327 99338->99222 99339->99227 99340->99234 99344->99249 99345->99252 99346->99258 99347->99260 99348->99264 99349->99265 99353 6f895c 99350->99353 99352 6f8997 99352->99269 99356 6f9f66 TlsSetValue 99352->99356 99353->99352 99354 6f897a 99353->99354 99359 705376 99353->99359 99354->99352 99354->99353 99367 6fa2b2 Sleep 99354->99367 99356->99272 99357->99276 99358->99273 99360 705381 99359->99360 99366 70539c 99359->99366 99361 70538d 99360->99361 99360->99366 99368 6f8ca8 58 API calls __getptd_noexit 99361->99368 99363 7053ac RtlAllocateHeap 99364 705392 99363->99364 99363->99366 99364->99353 99366->99363 99366->99364 99369 6f3521 DecodePointer 99366->99369 99367->99354 99368->99364 99369->99366 99370->99293 99371->99291 99372->99282 99373->99300 99374->99305 99375->99316 99377 6f8f51 99376->99377 99382 6f8dd9 99377->99382 99381 6f8f6c 99381->99319 99383 6f8df3 _memset __call_reportfault 99382->99383 99384 6f8e13 IsDebuggerPresent 99383->99384 99390 6fa2d5 SetUnhandledExceptionFilter UnhandledExceptionFilter 99384->99390 99386 6fc776 _$I10_OUTPUT 6 API calls 99388 6f8efa 99386->99388 99387 6f8ed7 __call_reportfault 99387->99386 99389 6fa2c0 GetCurrentProcess TerminateProcess 99388->99389 99389->99381 99390->99387 99392 6fa654 EncodePointer 99391->99392 99392->99392 99393 6fa66e 99392->99393 99393->99323 99395 6f9d8b __lock 58 API calls 99394->99395 99396 6f34f7 DecodePointer EncodePointer 99395->99396 99459 6f9ef5 LeaveCriticalSection 99396->99459 99398 6d49a7 99399 6f3554 99398->99399 99400 6f355e 99399->99400 99401 6f3578 99399->99401 99400->99401 99460 6f8ca8 58 API calls __getptd_noexit 99400->99460 99401->99333 99403 6f3568 99461 6f8f36 9 API calls _fseek 99403->99461 99405 6f3573 99405->99333 99406->99335 99408 6d3b59 __ftell_nolock 99407->99408 99409 6d77c7 59 API calls 99408->99409 99410 6d3b63 GetCurrentDirectoryW 99409->99410 99462 6d3778 99410->99462 99412 6d3b8c IsDebuggerPresent 99413 6d3b9a 99412->99413 99414 70d3dd MessageBoxA 99412->99414 99416 70d3f7 99413->99416 99417 6d3bb7 99413->99417 99445 6d3c73 99413->99445 99414->99416 99415 6d3c7a SetCurrentDirectoryW 99418 6d3c87 Mailbox 99415->99418 99595 6d7373 59 API calls Mailbox 99416->99595 99543 6d73e5 99417->99543 99418->99337 99421 70d407 99426 70d41d SetCurrentDirectoryW 99421->99426 99423 6d3bd5 GetFullPathNameW 99424 6d7d2c 59 API calls 99423->99424 99425 6d3c10 99424->99425 99559 6e0a8d 99425->99559 99426->99418 99429 6d3c2e 99430 6d3c38 99429->99430 99596 734a08 AllocateAndInitializeSid CheckTokenMembership FreeSid 99429->99596 99575 6d3a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 99430->99575 99433 70d43a 99433->99430 99436 70d44b 99433->99436 99438 6d4864 61 API calls 99436->99438 99437 6d3c42 99439 6d3c55 99437->99439 99583 6d43db 99437->99583 99440 70d453 99438->99440 99442 6e0b30 341 API calls 99439->99442 99443 6d7f41 59 API calls 99440->99443 99444 6d3c60 99442->99444 99446 70d460 99443->99446 99444->99445 99594 6d44cb Shell_NotifyIconW _memset 99444->99594 99445->99415 99448 70d46a 99446->99448 99449 70d48f 99446->99449 99451 6d7e0b 59 API calls 99448->99451 99450 6d7e0b 59 API calls 99449->99450 99452 70d48b GetForegroundWindow ShellExecuteW 99450->99452 99453 70d475 99451->99453 99457 70d4bf Mailbox 99452->99457 99455 6d7c8e 59 API calls 99453->99455 99457->99445 99459->99398 99460->99403 99461->99405 99463 6d77c7 59 API calls 99462->99463 99464 6d378e 99463->99464 99597 6d3d43 99464->99597 99466 6d37ac 99467 6d4864 61 API calls 99466->99467 99468 6d37c0 99467->99468 99469 6d7f41 59 API calls 99468->99469 99470 6d37cd 99469->99470 99471 6d4f3d 136 API calls 99470->99471 99472 6d37e6 99471->99472 99473 6d37ee Mailbox 99472->99473 99474 70d2de 99472->99474 99478 6d81a7 59 API calls 99473->99478 99639 739604 99474->99639 99477 70d2fd 99480 6f2ed5 _free 58 API calls 99477->99480 99481 6d3801 99478->99481 99479 6d4faa 84 API calls 99479->99477 99482 70d30a 99480->99482 99611 6d93ea 99481->99611 99484 6d4faa 84 API calls 99482->99484 99486 70d313 99484->99486 99490 6d3ee2 59 API calls 99486->99490 99487 6d7f41 59 API calls 99488 6d381a 99487->99488 99489 6d8620 69 API calls 99488->99489 99491 6d382c Mailbox 99489->99491 99492 70d32e 99490->99492 99493 6d7f41 59 API calls 99491->99493 99494 6d3ee2 59 API calls 99492->99494 99495 6d3852 99493->99495 99496 70d34a 99494->99496 99497 6d8620 69 API calls 99495->99497 99498 6d4864 61 API calls 99496->99498 99500 6d3861 Mailbox 99497->99500 99499 70d36f 99498->99499 99501 6d3ee2 59 API calls 99499->99501 99503 6d77c7 59 API calls 99500->99503 99502 70d37b 99501->99502 99504 6d81a7 59 API calls 99502->99504 99505 6d387f 99503->99505 99506 70d389 99504->99506 99614 6d3ee2 99505->99614 99508 6d3ee2 59 API calls 99506->99508 99510 70d398 99508->99510 99516 6d81a7 59 API calls 99510->99516 99512 6d3899 99512->99486 99513 6d38a3 99512->99513 99514 6f307d _W_store_winword 60 API calls 99513->99514 99515 6d38ae 99514->99515 99515->99492 99517 6d38b8 99515->99517 99518 70d3ba 99516->99518 99519 6f307d _W_store_winword 60 API calls 99517->99519 99520 6d3ee2 59 API calls 99518->99520 99521 6d38c3 99519->99521 99522 70d3c7 99520->99522 99521->99496 99523 6d38cd 99521->99523 99522->99522 99524 6f307d _W_store_winword 60 API calls 99523->99524 99525 6d38d8 99524->99525 99525->99510 99526 6d3919 99525->99526 99528 6d3ee2 59 API calls 99525->99528 99526->99510 99527 6d3926 99526->99527 99529 6d942e 59 API calls 99527->99529 99530 6d38fc 99528->99530 99531 6d3936 99529->99531 99532 6d81a7 59 API calls 99530->99532 99533 6d91b0 59 API calls 99531->99533 99534 6d390a 99532->99534 99535 6d3944 99533->99535 99536 6d3ee2 59 API calls 99534->99536 99630 6d9040 99535->99630 99536->99526 99538 6d3961 99539 6d93ea 59 API calls 99538->99539 99540 6d9040 60 API calls 99538->99540 99541 6d3ee2 59 API calls 99538->99541 99542 6d39a7 Mailbox 99538->99542 99539->99538 99540->99538 99541->99538 99542->99412 99544 6d73f2 __ftell_nolock 99543->99544 99545 6d740b 99544->99545 99546 70ed7b _memset 99544->99546 99547 6d48ae 60 API calls 99545->99547 99549 70ed97 GetOpenFileNameW 99546->99549 99548 6d7414 99547->99548 99680 6f0911 99548->99680 99551 70ede6 99549->99551 99553 6d7d2c 59 API calls 99551->99553 99555 70edfb 99553->99555 99555->99555 99556 6d7429 99698 6d69ca 99556->99698 99560 6e0a9a __ftell_nolock 99559->99560 99884 6d6ee0 99560->99884 99562 6e0a9f 99563 6d3c26 99562->99563 99895 6e12fe 89 API calls 99562->99895 99563->99421 99563->99429 99565 6e0aac 99565->99563 99896 6e4047 91 API calls Mailbox 99565->99896 99567 6e0ab5 99567->99563 99568 6e0ab9 GetFullPathNameW 99567->99568 99569 6d7d2c 59 API calls 99568->99569 99570 6e0ae5 99569->99570 99571 6d7d2c 59 API calls 99570->99571 99572 6e0af2 99571->99572 99573 715004 _wcscat 99572->99573 99574 6d7d2c 59 API calls 99572->99574 99574->99563 99576 70d3cc 99575->99576 99577 6d3ac2 LoadImageW RegisterClassExW 99575->99577 99900 6d48fe LoadImageW EnumResourceNamesW 99576->99900 99899 6d3041 7 API calls 99577->99899 99580 6d3b46 99582 6d39e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99580->99582 99581 70d3d5 99582->99437 99584 6d4406 _memset 99583->99584 99901 6d4213 99584->99901 99594->99445 99595->99421 99596->99433 99598 6d3d50 __ftell_nolock 99597->99598 99599 6d7d2c 59 API calls 99598->99599 99604 6d3eb6 Mailbox 99598->99604 99601 6d3d82 99599->99601 99600 6d7b52 59 API calls 99600->99601 99601->99600 99610 6d3db8 Mailbox 99601->99610 99602 6d7b52 59 API calls 99602->99610 99603 6d3e89 99603->99604 99605 6d7f41 59 API calls 99603->99605 99604->99466 99606 6d3eaa 99605->99606 99608 6d3f84 59 API calls 99606->99608 99607 6d7f41 59 API calls 99607->99610 99608->99604 99609 6d3f84 59 API calls 99609->99610 99610->99602 99610->99603 99610->99604 99610->99607 99610->99609 99612 6f0f36 Mailbox 59 API calls 99611->99612 99613 6d380d 99612->99613 99613->99487 99615 6d3eec 99614->99615 99616 6d3f05 99614->99616 99617 6d81a7 59 API calls 99615->99617 99618 6d7d2c 59 API calls 99616->99618 99619 6d388b 99617->99619 99618->99619 99620 6f307d 99619->99620 99621 6f30fe 99620->99621 99622 6f3089 99620->99622 99676 6f3110 60 API calls 3 library calls 99621->99676 99629 6f30ae 99622->99629 99674 6f8ca8 58 API calls __getptd_noexit 99622->99674 99624 6f310b 99624->99512 99626 6f3095 99675 6f8f36 9 API calls _fseek 99626->99675 99628 6f30a0 99628->99512 99629->99512 99631 70f4d5 99630->99631 99633 6d9057 99630->99633 99631->99633 99678 6d8d3b 59 API calls Mailbox 99631->99678 99634 6d915f 99633->99634 99635 6d9158 99633->99635 99636 6d91a0 99633->99636 99634->99538 99638 6f0f36 Mailbox 59 API calls 99635->99638 99677 6d9e9c 60 API calls Mailbox 99636->99677 99638->99634 99640 6d5045 85 API calls 99639->99640 99641 739673 99640->99641 99642 7397dd 96 API calls 99641->99642 99643 739685 99642->99643 99644 6d506b 74 API calls 99643->99644 99673 70d2f1 99643->99673 99645 7396a0 99644->99645 99646 6d506b 74 API calls 99645->99646 99647 7396b0 99646->99647 99648 6d506b 74 API calls 99647->99648 99649 7396cb 99648->99649 99650 6d506b 74 API calls 99649->99650 99651 7396e6 99650->99651 99652 6d5045 85 API calls 99651->99652 99653 7396fd 99652->99653 99654 6f588c __crtLCMapStringA_stat 58 API calls 99653->99654 99655 739704 99654->99655 99656 6f588c __crtLCMapStringA_stat 58 API calls 99655->99656 99657 73970e 99656->99657 99658 6d506b 74 API calls 99657->99658 99659 739722 99658->99659 99660 7391b2 GetSystemTimeAsFileTime 99659->99660 99661 739735 99660->99661 99662 73974a 99661->99662 99663 73975f 99661->99663 99664 6f2ed5 _free 58 API calls 99662->99664 99665 739765 99663->99665 99666 7397c4 99663->99666 99668 739750 99664->99668 99679 738baf 116 API calls __fcloseall 99665->99679 99667 6f2ed5 _free 58 API calls 99666->99667 99667->99673 99671 6f2ed5 _free 58 API calls 99668->99671 99670 7397bc 99672 6f2ed5 _free 58 API calls 99670->99672 99671->99673 99672->99673 99673->99477 99673->99479 99674->99626 99675->99628 99676->99624 99677->99634 99678->99633 99679->99670 99681 701ac0 __ftell_nolock 99680->99681 99682 6f091e GetLongPathNameW 99681->99682 99683 6d7d2c 59 API calls 99682->99683 99684 6d741d 99683->99684 99685 6d716b 99684->99685 99686 6d77c7 59 API calls 99685->99686 99687 6d717d 99686->99687 99688 6d48ae 60 API calls 99687->99688 99689 6d7188 99688->99689 99690 70ebde 99689->99690 99691 6d7193 99689->99691 99696 70ebf8 99690->99696 99738 6d7a68 61 API calls 99690->99738 99692 6d3f84 59 API calls 99691->99692 99694 6d719f 99692->99694 99732 6d34c2 99694->99732 99697 6d71b2 Mailbox 99697->99556 99699 6d4f3d 136 API calls 99698->99699 99700 6d69ef 99699->99700 99701 70e38a 99700->99701 99703 6d4f3d 136 API calls 99700->99703 99702 739604 122 API calls 99701->99702 99705 70e39f 99702->99705 99704 6d6a03 99703->99704 99704->99701 99706 6d6a0b 99704->99706 99707 70e3c0 99705->99707 99708 70e3a3 99705->99708 99709 6d6a17 99706->99709 99710 70e3ab 99706->99710 99712 6f0f36 Mailbox 59 API calls 99707->99712 99711 6d4faa 84 API calls 99708->99711 99739 6d6bec 99709->99739 99846 734339 90 API calls _wprintf 99710->99846 99711->99710 99731 70e405 Mailbox 99712->99731 99716 70e3b9 99716->99707 99717 70e5b9 99718 6f2ed5 _free 58 API calls 99717->99718 99719 70e5c1 99718->99719 99720 6d4faa 84 API calls 99719->99720 99725 70e5ca 99720->99725 99724 6f2ed5 _free 58 API calls 99724->99725 99725->99724 99726 6d4faa 84 API calls 99725->99726 99850 72fad2 89 API calls 4 library calls 99725->99850 99726->99725 99728 6d7f41 59 API calls 99728->99731 99731->99717 99731->99725 99731->99728 99832 6d766f 99731->99832 99840 6d74bd 99731->99840 99847 72fa6e 59 API calls 2 library calls 99731->99847 99848 72f98f 61 API calls 2 library calls 99731->99848 99849 737428 59 API calls Mailbox 99731->99849 99733 6d34d4 99732->99733 99737 6d34f3 _memmove 99732->99737 99735 6f0f36 Mailbox 59 API calls 99733->99735 99734 6f0f36 Mailbox 59 API calls 99736 6d350a 99734->99736 99735->99737 99736->99697 99737->99734 99738->99690 99740 70e777 99739->99740 99741 6d6c15 99739->99741 99872 72fad2 89 API calls 4 library calls 99740->99872 99856 6d5906 60 API calls Mailbox 99741->99856 99744 6d6c37 99857 6d5956 67 API calls 99744->99857 99745 70e78a 99873 72fad2 89 API calls 4 library calls 99745->99873 99747 6d6c4c 99747->99745 99749 6d6c54 99747->99749 99751 6d77c7 59 API calls 99749->99751 99750 70e7a6 99753 6d6cc1 99750->99753 99752 6d6c60 99751->99752 99858 6f0ad7 60 API calls __ftell_nolock 99752->99858 99755 6d6ccf 99753->99755 99756 70e7b9 99753->99756 99759 6d77c7 59 API calls 99755->99759 99758 6d5dcf CloseHandle 99756->99758 99757 6d6c6c 99760 6d77c7 59 API calls 99757->99760 99762 70e7c5 99758->99762 99763 6d6cd8 99759->99763 99761 6d6c78 99760->99761 99764 6d48ae 60 API calls 99761->99764 99765 6d4f3d 136 API calls 99762->99765 99766 6d77c7 59 API calls 99763->99766 99767 6d6c86 99764->99767 99768 70e7e1 99765->99768 99769 6d6ce1 99766->99769 99859 6d59b0 ReadFile SetFilePointerEx 99767->99859 99771 70e80a 99768->99771 99774 739604 122 API calls 99768->99774 99772 6d46f9 59 API calls 99769->99772 99874 72fad2 89 API calls 4 library calls 99771->99874 99775 6d6cf8 99772->99775 99773 6d6cb2 99860 6d5c4e SetFilePointerEx SetFilePointerEx 99773->99860 99779 70e7fd 99774->99779 99780 6d7c8e 59 API calls 99775->99780 99777 70e821 99810 6d6e6c Mailbox 99777->99810 99781 70e805 99779->99781 99782 70e826 99779->99782 99783 6d6d09 SetCurrentDirectoryW 99780->99783 99785 6d4faa 84 API calls 99781->99785 99784 6d4faa 84 API calls 99782->99784 99788 6d6d1c Mailbox 99783->99788 99786 70e82b 99784->99786 99785->99771 99787 6f0f36 Mailbox 59 API calls 99786->99787 99794 70e85f 99787->99794 99790 6f0f36 Mailbox 59 API calls 99788->99790 99792 6d6d2f 99790->99792 99791 6d3bcd 99791->99423 99791->99445 99793 6d538e 59 API calls 99792->99793 99821 6d6d3a Mailbox __wsetenvp 99793->99821 99795 6d766f 59 API calls 99794->99795 99829 70e8a8 Mailbox 99795->99829 99796 6d6e47 99868 6d5dcf 99796->99868 99799 70ea99 99879 737388 59 API calls Mailbox 99799->99879 99800 6d6e53 SetCurrentDirectoryW 99800->99810 99803 70eabb 99880 73f656 59 API calls 2 library calls 99803->99880 99806 70eac8 99808 6f2ed5 _free 58 API calls 99806->99808 99807 70eb32 99883 72fad2 89 API calls 4 library calls 99807->99883 99808->99810 99851 6d5934 99810->99851 99812 6d766f 59 API calls 99812->99829 99813 70eb4b 99813->99796 99815 70eb2a 99882 72f928 59 API calls 4 library calls 99815->99882 99818 6d7f41 59 API calls 99818->99821 99821->99796 99821->99807 99821->99815 99821->99818 99861 6d59cd 67 API calls _wcscpy 99821->99861 99862 6d70bd GetStringTypeW 99821->99862 99863 6d702c 60 API calls __wcsnicmp 99821->99863 99864 6d710a GetStringTypeW __wsetenvp 99821->99864 99865 6f37bd GetStringTypeW _iswctype 99821->99865 99866 6d6a3c 165 API calls 3 library calls 99821->99866 99867 6d7373 59 API calls Mailbox 99821->99867 99822 6d7f41 59 API calls 99822->99829 99826 70eaeb 99881 72fad2 89 API calls 4 library calls 99826->99881 99828 70eb04 99830 6f2ed5 _free 58 API calls 99828->99830 99829->99799 99829->99812 99829->99822 99829->99826 99875 72fa6e 59 API calls 2 library calls 99829->99875 99876 72f98f 61 API calls 2 library calls 99829->99876 99877 737428 59 API calls Mailbox 99829->99877 99878 6d7373 59 API calls Mailbox 99829->99878 99831 70eb17 99830->99831 99831->99810 99833 6d770f 99832->99833 99836 6d7682 _memmove 99832->99836 99835 6f0f36 Mailbox 59 API calls 99833->99835 99834 6f0f36 Mailbox 59 API calls 99838 6d7689 99834->99838 99835->99836 99836->99834 99837 6d76b2 99837->99731 99838->99837 99839 6f0f36 Mailbox 59 API calls 99838->99839 99839->99837 99841 6d74d0 99840->99841 99844 6d757e 99840->99844 99842 6f0f36 Mailbox 59 API calls 99841->99842 99845 6d7502 99841->99845 99842->99845 99843 6f0f36 59 API calls Mailbox 99843->99845 99844->99731 99845->99843 99845->99844 99846->99716 99847->99731 99848->99731 99849->99731 99850->99725 99852 6d5dcf CloseHandle 99851->99852 99853 6d593c Mailbox 99852->99853 99854 6d5dcf CloseHandle 99853->99854 99855 6d594b 99854->99855 99855->99791 99856->99744 99857->99747 99858->99757 99859->99773 99860->99753 99861->99821 99862->99821 99863->99821 99864->99821 99865->99821 99866->99821 99867->99821 99869 6d5dd9 99868->99869 99870 6d5de8 99868->99870 99869->99800 99870->99869 99871 6d5ded CloseHandle 99870->99871 99871->99869 99872->99745 99873->99750 99874->99777 99875->99829 99876->99829 99877->99829 99878->99829 99879->99803 99880->99806 99881->99828 99882->99807 99883->99813 99885 6d6ef5 99884->99885 99890 6d7009 99884->99890 99886 6f0f36 Mailbox 59 API calls 99885->99886 99885->99890 99888 6d6f1c 99886->99888 99887 6f0f36 Mailbox 59 API calls 99894 6d6f91 99887->99894 99888->99887 99890->99562 99892 6d74bd 59 API calls 99892->99894 99893 6d766f 59 API calls 99893->99894 99894->99890 99894->99892 99894->99893 99897 6d63a0 94 API calls 2 library calls 99894->99897 99898 7268a9 59 API calls Mailbox 99894->99898 99895->99565 99896->99567 99897->99894 99898->99894 99899->99580 99900->99581 99902 70d568 99901->99902 99903 6d4227 99901->99903 99902->99903 99928 6d3633 99929 6d366a 99928->99929 99930 6d3688 99929->99930 99931 6d36e7 99929->99931 99972 6d36e5 99929->99972 99932 6d375d PostQuitMessage 99930->99932 99933 6d3695 99930->99933 99935 6d36ed 99931->99935 99936 70d24c 99931->99936 99968 6d36d8 99932->99968 99937 6d36a0 99933->99937 99938 70d2bf 99933->99938 99934 6d36ca DefWindowProcW 99934->99968 99940 6d3715 SetTimer RegisterWindowMessageW 99935->99940 99941 6d36f2 99935->99941 99978 6e11d0 10 API calls Mailbox 99936->99978 99942 6d36a8 99937->99942 99943 6d3767 99937->99943 99982 73281f 71 API calls _memset 99938->99982 99944 6d373e CreatePopupMenu 99940->99944 99940->99968 99947 6d36f9 KillTimer 99941->99947 99948 70d1ef 99941->99948 99949 70d2a4 99942->99949 99950 6d36b3 99942->99950 99976 6d4531 64 API calls _memset 99943->99976 99944->99968 99946 70d273 99979 6e11f3 341 API calls Mailbox 99946->99979 99973 6d44cb Shell_NotifyIconW _memset 99947->99973 99954 70d1f4 99948->99954 99955 70d228 MoveWindow 99948->99955 99949->99934 99981 727f5e 59 API calls Mailbox 99949->99981 99957 6d36be 99950->99957 99958 6d374b 99950->99958 99951 70d2d1 99951->99934 99951->99968 99960 70d217 SetFocus 99954->99960 99961 70d1f8 99954->99961 99955->99968 99957->99934 99980 6d44cb Shell_NotifyIconW _memset 99957->99980 99975 6d45df 81 API calls _memset 99958->99975 99959 6d375b 99959->99968 99960->99968 99961->99957 99966 70d201 99961->99966 99962 6d370c 99974 6d3114 DeleteObject DestroyWindow Mailbox 99962->99974 99977 6e11d0 10 API calls Mailbox 99966->99977 99970 70d298 99971 6d43db 68 API calls 99970->99971 99971->99972 99972->99934 99973->99962 99974->99968 99975->99959 99976->99959 99977->99968 99978->99946 99979->99957 99980->99970 99981->99972 99982->99951

            Control-flow Graph

            APIs
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006D3B7A
            • IsDebuggerPresent.KERNEL32 ref: 006D3B8C
            • GetFullPathNameW.KERNEL32(00007FFF,?,?,007952F8,007952E0,?,?), ref: 006D3BFD
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
              • Part of subcall function 006E0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,006D3C26,007952F8,?,?,?), ref: 006E0ACE
            • SetCurrentDirectoryW.KERNEL32(?), ref: 006D3C81
            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00787770,00000010), ref: 0070D3EC
            • SetCurrentDirectoryW.KERNEL32(?,007952F8,?,?,?), ref: 0070D424
            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00784260,007952F8,?,?,?), ref: 0070D4AA
            • ShellExecuteW.SHELL32(00000000,?,?), ref: 0070D4B1
              • Part of subcall function 006D3A58: GetSysColorBrush.USER32(0000000F), ref: 006D3A62
              • Part of subcall function 006D3A58: LoadCursorW.USER32(00000000,00007F00), ref: 006D3A71
              • Part of subcall function 006D3A58: LoadIconW.USER32(00000063), ref: 006D3A88
              • Part of subcall function 006D3A58: LoadIconW.USER32(000000A4), ref: 006D3A9A
              • Part of subcall function 006D3A58: LoadIconW.USER32(000000A2), ref: 006D3AAC
              • Part of subcall function 006D3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 006D3AD2
              • Part of subcall function 006D3A58: RegisterClassExW.USER32(?), ref: 006D3B28
              • Part of subcall function 006D39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006D3A15
              • Part of subcall function 006D39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 006D3A36
              • Part of subcall function 006D39E7: ShowWindow.USER32(00000000,?,?), ref: 006D3A4A
              • Part of subcall function 006D39E7: ShowWindow.USER32(00000000,?,?), ref: 006D3A53
              • Part of subcall function 006D43DB: _memset.LIBCMT ref: 006D4401
              • Part of subcall function 006D43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006D44A6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
            • String ID: This is a third-party compiled AutoIt script.$runas$%v
            • API String ID: 529118366-287773948
            • Opcode ID: c72ed2d5b24ce06abedf6cceb710ddd6df05effb98e588c5c4ab4a7d53167ec5
            • Instruction ID: 589e65712a49e543315ccb2b83900632aa845367f8ae8c8d5bfe020693a1b4ce
            • Opcode Fuzzy Hash: c72ed2d5b24ce06abedf6cceb710ddd6df05effb98e588c5c4ab4a7d53167ec5
            • Instruction Fuzzy Hash: F151DAB0D04358AADF12EBB4EC05DFD7B76BF44340F10816BF451A6391DA785A46CB2A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 985 6d4fe9-6d5001 CreateStreamOnHGlobal 986 6d5021-6d5026 985->986 987 6d5003-6d501a FindResourceExW 985->987 988 70dc8c-70dc9b LoadResource 987->988 989 6d5020 987->989 988->989 990 70dca1-70dcaf SizeofResource 988->990 989->986 990->989 991 70dcb5-70dcc0 LockResource 990->991 991->989 992 70dcc6-70dce4 991->992 992->989
            APIs
            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,006D4EEE,?,?,00000000,00000000), ref: 006D4FF9
            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,006D4EEE,?,?,00000000,00000000), ref: 006D5010
            • LoadResource.KERNEL32(?,00000000,?,?,006D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,006D4F8F), ref: 0070DC90
            • SizeofResource.KERNEL32(?,00000000,?,?,006D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,006D4F8F), ref: 0070DCA5
            • LockResource.KERNEL32(Nm,?,?,006D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,006D4F8F,00000000), ref: 0070DCB8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
            • String ID: SCRIPT$Nm
            • API String ID: 3051347437-3508647929
            • Opcode ID: 987da9a4d218c54b876fdc5ede0e3c8441b2b7538fcc6b76e316601185e60524
            • Instruction ID: 5562f0b4718aef060f3a650cb8c28c84fafbca68503ba8080734cc64be14f3fc
            • Opcode Fuzzy Hash: 987da9a4d218c54b876fdc5ede0e3c8441b2b7538fcc6b76e316601185e60524
            • Instruction Fuzzy Hash: D0115EB5600700BFE7318B65DC48FA77BBAEBC9B12F208169F406C6690DBA1EC018661

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1049 6d4afe-6d4b5e call 6d77c7 GetVersionExW call 6d7d2c 1054 6d4c69-6d4c6b 1049->1054 1055 6d4b64 1049->1055 1056 70dac0-70dacc 1054->1056 1057 6d4b67-6d4b6c 1055->1057 1058 70dacd-70dad1 1056->1058 1059 6d4c70-6d4c71 1057->1059 1060 6d4b72 1057->1060 1062 70dad3 1058->1062 1063 70dad4-70dae0 1058->1063 1061 6d4b73-6d4baa call 6d7e8c call 6d7886 1059->1061 1060->1061 1071 70dbbd-70dbc0 1061->1071 1072 6d4bb0-6d4bb1 1061->1072 1062->1063 1063->1058 1065 70dae2-70dae7 1063->1065 1065->1057 1067 70daed-70daf4 1065->1067 1067->1056 1069 70daf6 1067->1069 1073 70dafb-70dafe 1069->1073 1074 70dbc2 1071->1074 1075 70dbd9-70dbdd 1071->1075 1072->1073 1076 6d4bb7-6d4bc2 1072->1076 1077 70db04-70db22 1073->1077 1078 6d4bf1-6d4c08 GetCurrentProcess IsWow64Process 1073->1078 1079 70dbc5 1074->1079 1083 70dbc8-70dbd1 1075->1083 1084 70dbdf-70dbe8 1075->1084 1080 70db43-70db49 1076->1080 1081 6d4bc8-6d4bca 1076->1081 1077->1078 1082 70db28-70db2e 1077->1082 1085 6d4c0d-6d4c1e 1078->1085 1086 6d4c0a 1078->1086 1079->1083 1091 70db53-70db59 1080->1091 1092 70db4b-70db4e 1080->1092 1087 6d4bd0-6d4bd3 1081->1087 1088 70db5e-70db6a 1081->1088 1089 70db30-70db33 1082->1089 1090 70db38-70db3e 1082->1090 1083->1075 1084->1079 1093 70dbea-70dbed 1084->1093 1094 6d4c89-6d4c93 GetSystemInfo 1085->1094 1095 6d4c20-6d4c30 call 6d4c95 1085->1095 1086->1085 1096 6d4bd9-6d4be8 1087->1096 1097 70db8a-70db8d 1087->1097 1099 70db74-70db7a 1088->1099 1100 70db6c-70db6f 1088->1100 1089->1078 1090->1078 1091->1078 1092->1078 1093->1083 1098 6d4c56-6d4c66 1094->1098 1106 6d4c7d-6d4c87 GetSystemInfo 1095->1106 1107 6d4c32-6d4c3f call 6d4c95 1095->1107 1102 6d4bee 1096->1102 1103 70db7f-70db85 1096->1103 1097->1078 1105 70db93-70dba8 1097->1105 1099->1078 1100->1078 1102->1078 1103->1078 1108 70dbb2-70dbb8 1105->1108 1109 70dbaa-70dbad 1105->1109 1110 6d4c47-6d4c4b 1106->1110 1114 6d4c76-6d4c7b 1107->1114 1115 6d4c41-6d4c45 GetNativeSystemInfo 1107->1115 1108->1078 1109->1078 1110->1098 1112 6d4c4d-6d4c50 FreeLibrary 1110->1112 1112->1098 1114->1115 1115->1110
            APIs
            • GetVersionExW.KERNEL32(?), ref: 006D4B2B
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            • GetCurrentProcess.KERNEL32(?,0075FAEC,00000000,00000000,?), ref: 006D4BF8
            • IsWow64Process.KERNEL32(00000000), ref: 006D4BFF
            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 006D4C45
            • FreeLibrary.KERNEL32(00000000), ref: 006D4C50
            • GetSystemInfo.KERNEL32(00000000), ref: 006D4C81
            • GetSystemInfo.KERNEL32(00000000), ref: 006D4C8D
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
            • String ID:
            • API String ID: 1986165174-0
            • Opcode ID: a4e8965af4b468ffbbc983d196153323933066f08e303506e95d02021dcfdab4
            • Instruction ID: cc10c584b1294ac8b925a3e67faadc310d42f37916e7eed5d24c92f1aff05649
            • Opcode Fuzzy Hash: a4e8965af4b468ffbbc983d196153323933066f08e303506e95d02021dcfdab4
            • Instruction Fuzzy Hash: 8691C47194A7C4DBC731CB6885511AABFE6AF3A300B484A9FD0CB83B41D635ED08D759
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: pby$%v
            • API String ID: 3964851224-305120522
            • Opcode ID: 74d67a0bd995046beff7bd707884f5d00a3ea4407c3e85b9d84a7652aa560580
            • Instruction ID: cb879e8d7011692304cf91190a12113f1ebfc0894ec65d54c3c0ef425c5991cf
            • Opcode Fuzzy Hash: 74d67a0bd995046beff7bd707884f5d00a3ea4407c3e85b9d84a7652aa560580
            • Instruction Fuzzy Hash: 91927E71609341DFE720DF19C480B6AB7E2BF84304F14896DE98A9B392D775EC85CB92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID: Ddy$Ddy$Ddy$Ddy$Variable must be of type 'Object'.
            • API String ID: 0-813853314
            • Opcode ID: 010c4233c4eee4cf0725a7263d4af406676aded813d212c90b422332804cfd2a
            • Instruction ID: b1d3b52d3ec3919faf069bd114a0e3a891537c12803f26dbe035d342585aed27
            • Opcode Fuzzy Hash: 010c4233c4eee4cf0725a7263d4af406676aded813d212c90b422332804cfd2a
            • Instruction Fuzzy Hash: 78A26C75E00205CFCB24DF58C480AAEB7B2FF58314F64816AE916AF351D736AD82CB91
            APIs
            • GetFileAttributesW.KERNELBASE(?,0070E6F1), ref: 007344AB
            • FindFirstFileW.KERNELBASE(?,?), ref: 007344BC
            • FindClose.KERNEL32(00000000), ref: 007344CC
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID:
            • API String ID: 48322524-0
            • Opcode ID: 22b3db488269b991b6ce86f63a71cb6f19adf001473fafbb19fcd84039510f20
            • Instruction ID: 0031eb12dc97cbf2b4b9eee17f44e5c6d2916f01f0d3c387df90baa0510d3baf
            • Opcode Fuzzy Hash: 22b3db488269b991b6ce86f63a71cb6f19adf001473fafbb19fcd84039510f20
            • Instruction Fuzzy Hash: FBE0D832810500676614B738EC0D4ED775CAE06336F104725F935C20E1E7BC6D10859A
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006E0BBB
            • timeGetTime.WINMM ref: 006E0E76
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006E0FB3
            • Sleep.KERNEL32(0000000A), ref: 006E0FC1
            • LockWindowUpdate.USER32(00000000,?,?), ref: 006E105A
            • DestroyWindow.USER32 ref: 006E1066
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006E1080
            • Sleep.KERNEL32(0000000A,?,?), ref: 007151DC
            • TranslateMessage.USER32(?), ref: 00715FB9
            • DispatchMessageW.USER32(?), ref: 00715FC7
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00715FDB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pby$pby$pby$pby
            • API String ID: 4212290369-17411944
            • Opcode ID: 24e11a9a7ce91438257335443334eb417eb60bae4e755931eb389563bb553402
            • Instruction ID: 5e73110a57d00044f02da0c9c1367cbff8abed05c5150ab73cbe5972ba658c45
            • Opcode Fuzzy Hash: 24e11a9a7ce91438257335443334eb417eb60bae4e755931eb389563bb553402
            • Instruction Fuzzy Hash: BAB2F670609741DFD728DF28C884BAAB7E6FF84304F14891DE49987391D779E885CB86

            Control-flow Graph

            APIs
              • Part of subcall function 00739008: __time64.LIBCMT ref: 00739012
              • Part of subcall function 006D5045: _fseek.LIBCMT ref: 006D505D
            • __wsplitpath.LIBCMT ref: 007392DD
              • Part of subcall function 006F426E: __wsplitpath_helper.LIBCMT ref: 006F42AE
            • _wcscpy.LIBCMT ref: 007392F0
            • _wcscat.LIBCMT ref: 00739303
            • __wsplitpath.LIBCMT ref: 00739328
            • _wcscat.LIBCMT ref: 0073933E
            • _wcscat.LIBCMT ref: 00739351
              • Part of subcall function 0073904E: _memmove.LIBCMT ref: 00739087
              • Part of subcall function 0073904E: _memmove.LIBCMT ref: 00739096
            • _wcscmp.LIBCMT ref: 00739298
              • Part of subcall function 007397DD: _wcscmp.LIBCMT ref: 007398CD
              • Part of subcall function 007397DD: _wcscmp.LIBCMT ref: 007398E0
            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007394FB
            • _wcsncpy.LIBCMT ref: 0073956E
            • DeleteFileW.KERNEL32(?,?), ref: 007395A4
            • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007395BA
            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007395CB
            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007395DD
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
            • String ID:
            • API String ID: 1500180987-0
            • Opcode ID: 2ecf0326bb228ec68535c0f8e0ff801fa3b2cdb12fa99aa9c089c74ee4174ed3
            • Instruction ID: d43fd8b7dd77e9818b9d1478b3173c720c311336786d82f4d6012125714a8112
            • Opcode Fuzzy Hash: 2ecf0326bb228ec68535c0f8e0ff801fa3b2cdb12fa99aa9c089c74ee4174ed3
            • Instruction Fuzzy Hash: 96C13BB1D0021DAADF21DF95CC85EDEB7BDEF54310F0040AAF609E6252DB749A848F65

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 006D3074
            • RegisterClassExW.USER32(00000030), ref: 006D309E
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006D30AF
            • InitCommonControlsEx.COMCTL32(?), ref: 006D30CC
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006D30DC
            • LoadIconW.USER32(000000A9), ref: 006D30F2
            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006D3101
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: 39997e61fb470c69076da03e42080f7eccdb528d8a7675e00dac09f19beee45f
            • Instruction ID: b625d975ba465c09fa4012b8dc7c6308a4ae60803520c2d1a9707fb349de91d4
            • Opcode Fuzzy Hash: 39997e61fb470c69076da03e42080f7eccdb528d8a7675e00dac09f19beee45f
            • Instruction Fuzzy Hash: 113149B1D01319AFDB01CFA4DC88ADDBBF0FB09311F14856AE580EA2A0D7B94646CF95

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 006D3074
            • RegisterClassExW.USER32(00000030), ref: 006D309E
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006D30AF
            • InitCommonControlsEx.COMCTL32(?), ref: 006D30CC
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006D30DC
            • LoadIconW.USER32(000000A9), ref: 006D30F2
            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006D3101
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: 4f7c7224f25bce070ac3a8eb433746a4976c81bedc2cfc6dfc5881ee1bf6db6b
            • Instruction ID: 0b7b40d1c30a25158429207b55cecdcc20e281029ca9768c21d9aa054fc353fd
            • Opcode Fuzzy Hash: 4f7c7224f25bce070ac3a8eb433746a4976c81bedc2cfc6dfc5881ee1bf6db6b
            • Instruction Fuzzy Hash: 0821F4B1D01718AFDB01DFA4EC88BDEBBF4FB08701F00812AF910A62A0D7B945458F99

            Control-flow Graph

            APIs
              • Part of subcall function 006D4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007952F8,?,006D37C0,?), ref: 006D4882
              • Part of subcall function 006F068B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,006D72C5), ref: 006F06AD
            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006D7308
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0070EC21
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0070EC62
            • RegCloseKey.ADVAPI32(?), ref: 0070ECA0
            • _wcscat.LIBCMT ref: 0070ECF9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
            • API String ID: 2673923337-2727554177
            • Opcode ID: 23a0020d2310068f1a3979823c4a5ce3080d38698bdf9016c5266ab634b3fc90
            • Instruction ID: 793e79abc15ef74a09e05c841e93c5cad5b81b0e2b9275d5402f48c10e0b5a7e
            • Opcode Fuzzy Hash: 23a0020d2310068f1a3979823c4a5ce3080d38698bdf9016c5266ab634b3fc90
            • Instruction Fuzzy Hash: E371A1715093019EC704DF25EC419ABBBE9FF88350F408A2FF445C32A1EB799949CB9A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 762 6d3633-6d3681 764 6d36e1-6d36e3 762->764 765 6d3683-6d3686 762->765 764->765 768 6d36e5 764->768 766 6d3688-6d368f 765->766 767 6d36e7 765->767 769 6d375d-6d3765 PostQuitMessage 766->769 770 6d3695-6d369a 766->770 772 6d36ed-6d36f0 767->772 773 70d24c-70d27a call 6e11d0 call 6e11f3 767->773 771 6d36ca-6d36d2 DefWindowProcW 768->771 778 6d3711-6d3713 769->778 774 6d36a0-6d36a2 770->774 775 70d2bf-70d2d3 call 73281f 770->775 777 6d36d8-6d36de 771->777 779 6d3715-6d373c SetTimer RegisterWindowMessageW 772->779 780 6d36f2-6d36f3 772->780 808 70d27f-70d286 773->808 781 6d36a8-6d36ad 774->781 782 6d3767-6d3776 call 6d4531 774->782 775->778 799 70d2d9 775->799 778->777 779->778 783 6d373e-6d3749 CreatePopupMenu 779->783 786 6d36f9-6d370c KillTimer call 6d44cb call 6d3114 780->786 787 70d1ef-70d1f2 780->787 788 70d2a4-70d2ab 781->788 789 6d36b3-6d36b8 781->789 782->778 783->778 786->778 793 70d1f4-70d1f6 787->793 794 70d228-70d247 MoveWindow 787->794 788->771 796 70d2b1-70d2ba call 727f5e 788->796 797 6d36be-6d36c4 789->797 798 6d374b-6d375b call 6d45df 789->798 802 70d217-70d223 SetFocus 793->802 803 70d1f8-70d1fb 793->803 794->778 796->771 797->771 797->808 798->778 799->771 802->778 803->797 809 70d201-70d212 call 6e11d0 803->809 808->771 812 70d28c-70d29f call 6d44cb call 6d43db 808->812 809->778 812->771
            APIs
            • DefWindowProcW.USER32(?,?,?,?), ref: 006D36D2
            • KillTimer.USER32(?,00000001), ref: 006D36FC
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006D371F
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006D372A
            • CreatePopupMenu.USER32 ref: 006D373E
            • PostQuitMessage.USER32(00000000), ref: 006D375F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
            • String ID: TaskbarCreated$%v
            • API String ID: 129472671-4049267007
            • Opcode ID: df54c8e8caa940298d6254bee398b862242c6a48e28934fcdf17dd6ae38d2eab
            • Instruction ID: a2916e403d0396a443021f9260bc165b6206296ba560258d6f9e72618ddab22e
            • Opcode Fuzzy Hash: df54c8e8caa940298d6254bee398b862242c6a48e28934fcdf17dd6ae38d2eab
            • Instruction Fuzzy Hash: ED4138B1900A65BBDF115B64EC09BB93797FB04300F10452BF502863E1DAB8DE02976B

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 006D3A62
            • LoadCursorW.USER32(00000000,00007F00), ref: 006D3A71
            • LoadIconW.USER32(00000063), ref: 006D3A88
            • LoadIconW.USER32(000000A4), ref: 006D3A9A
            • LoadIconW.USER32(000000A2), ref: 006D3AAC
            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 006D3AD2
            • RegisterClassExW.USER32(?), ref: 006D3B28
              • Part of subcall function 006D3041: GetSysColorBrush.USER32(0000000F), ref: 006D3074
              • Part of subcall function 006D3041: RegisterClassExW.USER32(00000030), ref: 006D309E
              • Part of subcall function 006D3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006D30AF
              • Part of subcall function 006D3041: InitCommonControlsEx.COMCTL32(?), ref: 006D30CC
              • Part of subcall function 006D3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006D30DC
              • Part of subcall function 006D3041: LoadIconW.USER32(000000A9), ref: 006D30F2
              • Part of subcall function 006D3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006D3101
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$AutoIt v3
            • API String ID: 423443420-4155596026
            • Opcode ID: f8249e3ef612ccf759a0b766daca987cecec72d48ecc2efebe79d167238fd4b3
            • Instruction ID: 92b2dde89213c846b5a5172fed5468a988026d143cd893b8ca266e0a8322f148
            • Opcode Fuzzy Hash: f8249e3ef612ccf759a0b766daca987cecec72d48ecc2efebe79d167238fd4b3
            • Instruction Fuzzy Hash: 38214BB0D00328AFEB11DFA4EC09B9D7BB5FB08711F00816BE504A63A1D3B956418F88

            Control-flow Graph

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$Ry
            • API String ID: 1825951767-3154507284
            • Opcode ID: 21b9ce0ef4c7259c73b370daa6a274ee12a4375e8fb143c7ea227be2d4f4b0d2
            • Instruction ID: 492377edee0f425c5541080578112148bb8d69211130d805bca3d04199c47f6c
            • Opcode Fuzzy Hash: 21b9ce0ef4c7259c73b370daa6a274ee12a4375e8fb143c7ea227be2d4f4b0d2
            • Instruction Fuzzy Hash: E0A14FB2C102299ACB55EBA0DC95EEEB77ABF14300F44052FE412B7391EF745A09CB65

            Control-flow Graph

            APIs
              • Part of subcall function 006F02E2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006F0313
              • Part of subcall function 006F02E2: MapVirtualKeyW.USER32(00000010,00000000), ref: 006F031B
              • Part of subcall function 006F02E2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006F0326
              • Part of subcall function 006F02E2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006F0331
              • Part of subcall function 006F02E2: MapVirtualKeyW.USER32(00000011,00000000), ref: 006F0339
              • Part of subcall function 006F02E2: MapVirtualKeyW.USER32(00000012,00000000), ref: 006F0341
              • Part of subcall function 006E6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,006DFA90), ref: 006E62B4
            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 006DFB2D
            • OleInitialize.OLE32(00000000), ref: 006DFBAA
            • CloseHandle.KERNEL32(00000000), ref: 00714921
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
            • String ID: <Wy$\Ty$%v$Sy
            • API String ID: 1986988660-633510519
            • Opcode ID: eacc36e668fc6e1c96e4ad76d59229607ec9b982a7693975fa18d578b89e329b
            • Instruction ID: b52ee37a6bf1cd2ff478b8b92175f52691d5988cca80e1df343a890b6eb47a65
            • Opcode Fuzzy Hash: eacc36e668fc6e1c96e4ad76d59229607ec9b982a7693975fa18d578b89e329b
            • Instruction Fuzzy Hash: 8681CAB0905AA08FC7C6DF79A9456197BE6AB8830A350C13B9409CB372EB7C44868F59

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 995 138b628-138b6d6 call 1389038 998 138b6dd-138b703 call 138c538 CreateFileW 995->998 1001 138b70a-138b71a 998->1001 1002 138b705 998->1002 1009 138b71c 1001->1009 1010 138b721-138b73b VirtualAlloc 1001->1010 1003 138b855-138b859 1002->1003 1004 138b89b-138b89e 1003->1004 1005 138b85b-138b85f 1003->1005 1011 138b8a1-138b8a8 1004->1011 1007 138b86b-138b86f 1005->1007 1008 138b861-138b864 1005->1008 1012 138b87f-138b883 1007->1012 1013 138b871-138b87b 1007->1013 1008->1007 1009->1003 1014 138b73d 1010->1014 1015 138b742-138b759 ReadFile 1010->1015 1016 138b8aa-138b8b5 1011->1016 1017 138b8fd-138b912 1011->1017 1020 138b893 1012->1020 1021 138b885-138b88f 1012->1021 1013->1012 1014->1003 1022 138b75b 1015->1022 1023 138b760-138b7a0 VirtualAlloc 1015->1023 1024 138b8b9-138b8c5 1016->1024 1025 138b8b7 1016->1025 1018 138b922-138b92a 1017->1018 1019 138b914-138b91f VirtualFree 1017->1019 1019->1018 1020->1004 1021->1020 1022->1003 1028 138b7a2 1023->1028 1029 138b7a7-138b7c2 call 138c788 1023->1029 1026 138b8d9-138b8e5 1024->1026 1027 138b8c7-138b8d7 1024->1027 1025->1017 1031 138b8f2-138b8f8 1026->1031 1032 138b8e7-138b8f0 1026->1032 1030 138b8fb 1027->1030 1028->1003 1035 138b7cd-138b7d7 1029->1035 1030->1011 1031->1030 1032->1030 1036 138b7d9-138b808 call 138c788 1035->1036 1037 138b80a-138b81e call 138c598 1035->1037 1036->1035 1043 138b820 1037->1043 1044 138b822-138b826 1037->1044 1043->1003 1045 138b828-138b82c CloseHandle 1044->1045 1046 138b832-138b836 1044->1046 1045->1046 1047 138b838-138b843 VirtualFree 1046->1047 1048 138b846-138b84f 1046->1048 1047->1048 1048->998 1048->1003
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0138B6F9
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0138B91F
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
            • Instruction ID: d559231bd0928c172431f0f4503897f79c006cee58bea8f55d07d4d9d279fc27
            • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
            • Instruction Fuzzy Hash: F4A1E474E10309EFDB14EBA8C894BEEBBB5BF48308F208159E615BB284D7759A41CB54

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1116 6d39e7-6d3a57 CreateWindowExW * 2 ShowWindow * 2
            APIs
            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006D3A15
            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 006D3A36
            • ShowWindow.USER32(00000000,?,?), ref: 006D3A4A
            • ShowWindow.USER32(00000000,?,?), ref: 006D3A53
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: ae892db3183a81ec1d031820f713192e584707ae47e44075d4b5edf4ca62bb49
            • Instruction ID: f7d4c183f6a1c3e5d872d335f990189ed554cdc086277834418babc5841a9a41
            • Opcode Fuzzy Hash: ae892db3183a81ec1d031820f713192e584707ae47e44075d4b5edf4ca62bb49
            • Instruction Fuzzy Hash: 87F0D0B15416A07EEA3257176C49E672F7DE7C6F61B00812EF904A21B0C6A91852DBB8

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1469 138b3e8-138b522 call 1389038 call 138b2d8 CreateFileW 1476 138b529-138b539 1469->1476 1477 138b524 1469->1477 1480 138b53b 1476->1480 1481 138b540-138b55a VirtualAlloc 1476->1481 1478 138b5d9-138b5de 1477->1478 1480->1478 1482 138b55c 1481->1482 1483 138b55e-138b575 ReadFile 1481->1483 1482->1478 1484 138b579-138b5b3 call 138b318 call 138a2d8 1483->1484 1485 138b577 1483->1485 1490 138b5cf-138b5d7 ExitProcess 1484->1490 1491 138b5b5-138b5ca call 138b368 1484->1491 1485->1478 1490->1478 1491->1490
            APIs
              • Part of subcall function 0138B2D8: Sleep.KERNELBASE(000001F4), ref: 0138B2E9
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0138B518
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: HTPSXP60TSMSV
            • API String ID: 2694422964-3515363255
            • Opcode ID: da9fa9496b1e13b8c72b8893d3d0db3901684908e74ef64f38909ecadd5c3704
            • Instruction ID: 28c563c36958349ce4bcce533320a8166a858d4b6c60c087b880a6f28fd96676
            • Opcode Fuzzy Hash: da9fa9496b1e13b8c72b8893d3d0db3901684908e74ef64f38909ecadd5c3704
            • Instruction Fuzzy Hash: A2517130D14349EBEF11DBA4C854BEEBB79AF58704F004199E609BB2C0DBB90B45CBA5

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1493 6d410d-6d4123 1494 6d4129-6d413e call 6d7b76 1493->1494 1495 6d4200-6d4204 1493->1495 1498 6d4144-6d4164 call 6d7d2c 1494->1498 1499 70d50d-70d51c LoadStringW 1494->1499 1502 70d527-70d53f call 6d7c8e call 6d7143 1498->1502 1503 6d416a-6d416e 1498->1503 1499->1502 1512 6d417e-6d41fb call 6f2f60 call 6d463e call 6f2f3c Shell_NotifyIconW call 6d5a64 1502->1512 1514 70d545-70d563 call 6d7e0b call 6d7143 call 6d7e0b 1502->1514 1505 6d4205-6d420e call 6d81a7 1503->1505 1506 6d4174-6d4179 call 6d7c8e 1503->1506 1505->1512 1506->1512 1512->1495 1514->1512
            APIs
            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0070D51C
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            • _memset.LIBCMT ref: 006D418D
            • _wcscpy.LIBCMT ref: 006D41E1
            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006D41F1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
            • String ID: Line:
            • API String ID: 3942752672-1585850449
            • Opcode ID: 0e7d7268e9445c4a6db4566c0d5b8a6ae935cbb7edf9d7649a52ec4497835380
            • Instruction ID: 4a58acf06990ab9532d56c0cdc9a3da12b1e1d5709ff992ddd5de314320e046e
            • Opcode Fuzzy Hash: 0e7d7268e9445c4a6db4566c0d5b8a6ae935cbb7edf9d7649a52ec4497835380
            • Instruction Fuzzy Hash: AC31E4718083149FD762EB60DC45BEB77E9AF44304F10461FF18592291EF749A49C78B
            APIs
              • Part of subcall function 006D4F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006D4F6F
            • _free.LIBCMT ref: 0070E5BC
            • _free.LIBCMT ref: 0070E603
              • Part of subcall function 006D6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 006D6D0D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _free$CurrentDirectoryLibraryLoad
            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
            • API String ID: 2861923089-1757145024
            • Opcode ID: 224773bd3a2b390833dcf701caa4d53bcb504eae21310a9479bfd6719e49030a
            • Instruction ID: 87a0450431e55eb3a9ec7e668230817c4ced36b68c4b47c9846aa14fe9a0ad61
            • Opcode Fuzzy Hash: 224773bd3a2b390833dcf701caa4d53bcb504eae21310a9479bfd6719e49030a
            • Instruction Fuzzy Hash: 74917A71D10259EFCF14EFA4CC919EDB7B5BF08314F14492AF816AB2A1EB38A914CB54
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006D35A1,SwapMouseButtons,00000004,?), ref: 006D35D4
            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006D35A1,SwapMouseButtons,00000004,?,?,?,?,006D2754), ref: 006D35F5
            • RegCloseKey.KERNELBASE(00000000,?,?,006D35A1,SwapMouseButtons,00000004,?,?,?,?,006D2754), ref: 006D3617
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID: Control Panel\Mouse
            • API String ID: 3677997916-824357125
            • Opcode ID: e62ebd31a33a84caa8639459e996239736e6c1820c59a8da9d04da54dac31119
            • Instruction ID: fac3a66b0b00dc34260c3a6c69bda99f5c2a62483a461f1cc14a158195fc7765
            • Opcode Fuzzy Hash: e62ebd31a33a84caa8639459e996239736e6c1820c59a8da9d04da54dac31119
            • Instruction Fuzzy Hash: E9113375A10268BADB208F64DC80EEABBA9EF04740F00846AE809D7310E2719E409BA5
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 0138AA93
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0138AB29
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0138AB4B
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
            • Instruction ID: 2688a4d81ed935abcec8fae3260f2a96189d53dd1d3c6acbd1648dca9456c8f9
            • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
            • Instruction Fuzzy Hash: 7F621C30A14618DBEB24DFA4C850BDEB376EF58304F1095A9D20DEB390E7799E81CB59
            APIs
              • Part of subcall function 006D5045: _fseek.LIBCMT ref: 006D505D
              • Part of subcall function 007397DD: _wcscmp.LIBCMT ref: 007398CD
              • Part of subcall function 007397DD: _wcscmp.LIBCMT ref: 007398E0
            • _free.LIBCMT ref: 0073974B
            • _free.LIBCMT ref: 00739752
            • _free.LIBCMT ref: 007397BD
              • Part of subcall function 006F2ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,006F9BA4), ref: 006F2EE9
              • Part of subcall function 006F2ED5: GetLastError.KERNEL32(00000000,?,006F9BA4), ref: 006F2EFB
            • _free.LIBCMT ref: 007397C5
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
            • String ID:
            • API String ID: 1552873950-0
            • Opcode ID: e7380544773663296b0c3136f1e3976d6f6c9a32d6817a33089202c8b0d22308
            • Instruction ID: 0bf21b88e1c1d42c399372369857a3c9c6a8e49135ec678576a6741b0533d590
            • Opcode Fuzzy Hash: e7380544773663296b0c3136f1e3976d6f6c9a32d6817a33089202c8b0d22308
            • Instruction Fuzzy Hash: 9A5160B1D04219AFDF649F64CC85AAEBB7AEF48310F10049EF609A7342DB755A80CF58
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
            • String ID:
            • API String ID: 2782032738-0
            • Opcode ID: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
            • Instruction ID: 76d92a8f64a17c90b0ebce1dba4c56f59ed11c9a1d62233f3c4a532ce704a0bb
            • Opcode Fuzzy Hash: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
            • Instruction Fuzzy Hash: F241C531B0474EABDB188E69C8819BF77A7AF443A0B24857DEA55C7B80DEB0DD418B44
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove
            • String ID: AU3!P/v$EA06
            • API String ID: 4104443479-2268320372
            • Opcode ID: 802cc36beabb0fad290d86f2978399c35877494a39195fbed2dceee7036dea5f
            • Instruction ID: 5e30e207497dbf2e01c4747a1109eaa6e6fca89906e8f59a24ec7e3629af5515
            • Opcode Fuzzy Hash: 802cc36beabb0fad290d86f2978399c35877494a39195fbed2dceee7036dea5f
            • Instruction Fuzzy Hash: D8415C61E04258BBDF219B6488917BE7FA7AF45300F68406BEC82DB382CE359D4587E1
            APIs
            • _memset.LIBCMT ref: 0070ED92
            • GetOpenFileNameW.COMDLG32(?), ref: 0070EDDC
              • Part of subcall function 006D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006D48A1,?,?,006D37C0,?), ref: 006D48CE
              • Part of subcall function 006F0911: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006F0930
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Name$Path$FileFullLongOpen_memset
            • String ID: X
            • API String ID: 3777226403-3081909835
            • Opcode ID: e73136d8d92e6a5f4b99b123f3a1e54279d362dff24405cac30f934f805ec6a3
            • Instruction ID: b4fa168b56f6e9c207b5690437d6b8b57ad4af49b16814f3cc5472ba59b24900
            • Opcode Fuzzy Hash: e73136d8d92e6a5f4b99b123f3a1e54279d362dff24405cac30f934f805ec6a3
            • Instruction Fuzzy Hash: 2821A170E002589BDB51DF94CC45BEE7BFAAF48304F04801AE508A7381DFB859898BA6
            APIs
            • GetTempPathW.KERNEL32(00000104,?), ref: 007399A1
            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 007399B8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Temp$FileNamePath
            • String ID: aut
            • API String ID: 3285503233-3010740371
            • Opcode ID: 27d1448a4255222eebba42f79123bbb8f47ff34bceb17cb51b868499cbcf2039
            • Instruction ID: 3f810a0c62ff5f8f96d0b61cbe8fe94b1edc701196563ca903230f4da6b9aabd
            • Opcode Fuzzy Hash: 27d1448a4255222eebba42f79123bbb8f47ff34bceb17cb51b868499cbcf2039
            • Instruction Fuzzy Hash: 50D05EB998030DABDB50BBA0DC0EFDA773CE704701F4042B1FA54960A1EAB495988B96
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f8556eaa5da9a05cf8c323025be23e9401799f611d1db20c53008f87e4c26415
            • Instruction ID: a4696cd21e28a97fd836cdff04a97d505c29e2bce5ec105fa193d1bffa5ecc25
            • Opcode Fuzzy Hash: f8556eaa5da9a05cf8c323025be23e9401799f611d1db20c53008f87e4c26415
            • Instruction Fuzzy Hash: 02F13571A083119FCB64DF28C484A6ABBE5FF88314F14892EF8999B351D735E945CF82
            APIs
            • _memset.LIBCMT ref: 006D4401
            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 006D44A6
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 006D44C3
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: IconNotifyShell_$_memset
            • String ID:
            • API String ID: 1505330794-0
            • Opcode ID: 3881c7e85e97501f1c69af0e6710a8ac7fcd2a46d859992fbcf14605054961b2
            • Instruction ID: ca6b07ed2ed31ea3e92ddb0e29484643ae8a9a66e2d8f0627e6bdcfdbaadc51c
            • Opcode Fuzzy Hash: 3881c7e85e97501f1c69af0e6710a8ac7fcd2a46d859992fbcf14605054961b2
            • Instruction Fuzzy Hash: 20318EB09047118FD721DF64D88469BBBE9FB48308F00492FF59A82351DBB5AD84CB96
            APIs
            • __FF_MSGBANNER.LIBCMT ref: 006F58A3
              • Part of subcall function 006FA2EB: __NMSG_WRITE.LIBCMT ref: 006FA312
              • Part of subcall function 006FA2EB: __NMSG_WRITE.LIBCMT ref: 006FA31C
            • __NMSG_WRITE.LIBCMT ref: 006F58AA
              • Part of subcall function 006FA348: GetModuleFileNameW.KERNEL32(00000000,007933BA,00000104,?,00000001,00000000), ref: 006FA3DA
              • Part of subcall function 006FA348: ___crtMessageBoxW.LIBCMT ref: 006FA488
              • Part of subcall function 006F321F: ___crtCorExitProcess.LIBCMT ref: 006F3225
              • Part of subcall function 006F321F: ExitProcess.KERNEL32 ref: 006F322E
              • Part of subcall function 006F8CA8: __getptd_noexit.LIBCMT ref: 006F8CA8
            • RtlAllocateHeap.NTDLL(01000000,00000000,00000001,00000000,?,?,?,006F0F53,?), ref: 006F58CF
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
            • String ID:
            • API String ID: 1372826849-0
            • Opcode ID: f059ffcc44fe38473419b58717d3b1ad2b2f24eecc50ede441f95ae35201bcde
            • Instruction ID: fa17fc7818f77e2ac0e93e5584f80342f63386c97917359c60c5760552a1def0
            • Opcode Fuzzy Hash: f059ffcc44fe38473419b58717d3b1ad2b2f24eecc50ede441f95ae35201bcde
            • Instruction Fuzzy Hash: 6C01D231341B2D9AD65427749C52A7E735BDF817A0B10012AF712AB282DFB09E014669
            APIs
            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,007395F1,?,?,?,?,?,00000004), ref: 00739964
            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,007395F1,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0073997A
            • CloseHandle.KERNEL32(00000000,?,007395F1,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00739981
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: File$CloseCreateHandleTime
            • String ID:
            • API String ID: 3397143404-0
            • Opcode ID: 06bbfd29e62e1a883de36c94ae781237c9a15d183a9f69dc1be79b6fcb95ca22
            • Instruction ID: 6d92077d59974afc589e7039d1e072607329e304e41126b0d618fd66e98d8bc7
            • Opcode Fuzzy Hash: 06bbfd29e62e1a883de36c94ae781237c9a15d183a9f69dc1be79b6fcb95ca22
            • Instruction Fuzzy Hash: 11E08632141728B7EB212B54EC09FDA7F18AB45761F108220FB54A90E087F52911979C
            APIs
            • _free.LIBCMT ref: 00738DC4
              • Part of subcall function 006F2ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,006F9BA4), ref: 006F2EE9
              • Part of subcall function 006F2ED5: GetLastError.KERNEL32(00000000,?,006F9BA4), ref: 006F2EFB
            • _free.LIBCMT ref: 00738DD5
            • _free.LIBCMT ref: 00738DE7
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 3221efda5ec1aeb3564d3aaca8a62a8878e7642d45a62f0f0d26450024f2f6e1
            • Instruction ID: fa0bf962da5113e02916313c6a4eb06850dd3878aa23ccb937885c8baaa4cf27
            • Opcode Fuzzy Hash: 3221efda5ec1aeb3564d3aaca8a62a8878e7642d45a62f0f0d26450024f2f6e1
            • Instruction Fuzzy Hash: 20E012A171170643DAA465786950EA313ED5F9C361B64081EB949D7583CE38F8818568
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID: CALL
            • API String ID: 0-4196123274
            • Opcode ID: f785e57e40c75738d043c8a6f81dd03629948c7fad4ee585f02361e93388b184
            • Instruction ID: 84c4b9631980420612c8991a26920b6f650d2228ab90aba1ce08ae34e6d72793
            • Opcode Fuzzy Hash: f785e57e40c75738d043c8a6f81dd03629948c7fad4ee585f02361e93388b184
            • Instruction Fuzzy Hash: 3A225970908341CFDB24DF54C494B6AB7E2BF84304F15896EE88A8B362D775ED85CB86
            APIs
            • IsThemeActive.UXTHEME ref: 006D4992
              • Part of subcall function 006F34EC: __lock.LIBCMT ref: 006F34F2
              • Part of subcall function 006F34EC: DecodePointer.KERNEL32(00000001,?,006D49A7,00727F9C), ref: 006F34FE
              • Part of subcall function 006F34EC: EncodePointer.KERNEL32(?,?,006D49A7,00727F9C), ref: 006F3509
              • Part of subcall function 006D4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 006D4A73
              • Part of subcall function 006D4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 006D4A88
              • Part of subcall function 006D3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006D3B7A
              • Part of subcall function 006D3B4C: IsDebuggerPresent.KERNEL32 ref: 006D3B8C
              • Part of subcall function 006D3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,007952F8,007952E0,?,?), ref: 006D3BFD
              • Part of subcall function 006D3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 006D3C81
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 006D49D2
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
            • String ID:
            • API String ID: 1438897964-0
            • Opcode ID: e8b8aa7bbc1eba0baa2eec62912517c26536dbb31597a97e042051e7482b386b
            • Instruction ID: f945f73ab8a3a7571d9b6be3ae2556959281a5bd51311b6bfe829d6b05f6412e
            • Opcode Fuzzy Hash: e8b8aa7bbc1eba0baa2eec62912517c26536dbb31597a97e042051e7482b386b
            • Instruction Fuzzy Hash: 8F119DB18043219BC710EF69E84591AFFE9FB88710F00891FF045873B1DBB49A46CB9A
            APIs
              • Part of subcall function 006F588C: __FF_MSGBANNER.LIBCMT ref: 006F58A3
              • Part of subcall function 006F588C: __NMSG_WRITE.LIBCMT ref: 006F58AA
              • Part of subcall function 006F588C: RtlAllocateHeap.NTDLL(01000000,00000000,00000001,00000000,?,?,?,006F0F53,?), ref: 006F58CF
            • std::exception::exception.LIBCMT ref: 006F0F6C
            • __CxxThrowException@8.LIBCMT ref: 006F0F81
              • Part of subcall function 006F871B: RaiseException.KERNEL32(?,?,?,00789E78,00000000,?,?,?,?,006F0F86,?,00789E78,?,00000001), ref: 006F8770
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
            • String ID:
            • API String ID: 3902256705-0
            • Opcode ID: beceb6822caf245e953721e235ce269911c4252cf7f8c9f7f441b3aa96f3a81c
            • Instruction ID: 2ffb122c790b22b56ed537f475b5c407c4a6be86e4ac94472c2a6c1b35e49e23
            • Opcode Fuzzy Hash: beceb6822caf245e953721e235ce269911c4252cf7f8c9f7f441b3aa96f3a81c
            • Instruction Fuzzy Hash: B7F0F43190521D6ADB20BA98EC019FE7BAE9F00350F200469FF09D6283DF708E5182D9
            APIs
              • Part of subcall function 006F8CA8: __getptd_noexit.LIBCMT ref: 006F8CA8
            • __lock_file.LIBCMT ref: 006F555B
              • Part of subcall function 006F6D8E: __lock.LIBCMT ref: 006F6DB1
            • __fclose_nolock.LIBCMT ref: 006F5566
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 2800547568-0
            • Opcode ID: 0ec63baa3c92b798561bf8fb32a0e1852c1ab784cad9bb357ffb80e7dc198c5a
            • Instruction ID: 437ba42295fee83124b419aea2ae52f3e8ca35f7eac8c0f528239be789cb797a
            • Opcode Fuzzy Hash: 0ec63baa3c92b798561bf8fb32a0e1852c1ab784cad9bb357ffb80e7dc198c5a
            • Instruction Fuzzy Hash: 94F09071905A0C9EEB506B7988027BE66A36F41331F14824DB716AB1C1DB7C8D029B5A
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 0138AA93
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0138AB29
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0138AB4B
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
            • Instruction ID: 7b25a8d2d093c0b16fba93b09e267cc824f01e3f0e42ef2b5dbb5d775c684ce9
            • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
            • Instruction Fuzzy Hash: C412CE24E14658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: 2bfb27314d905280b056b4b7b5233f1a1f420e589514f8b07931f4aa42e02bde
            • Instruction ID: bc94e342ce92c6ae3396f632ec8576d2d2a200e5afe679733ca2c1b0eef5c0cc
            • Opcode Fuzzy Hash: 2bfb27314d905280b056b4b7b5233f1a1f420e589514f8b07931f4aa42e02bde
            • Instruction Fuzzy Hash: F831B479A09A02DFD7249F19D490971F7E2FF09320714C56EE9898B7A5F730E882CB85
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: c6d4df6de196a1b058258a1e0a5a6465ba11f4ae5daf84dd7a70b0f1e20bf77a
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: 1F31C874A00109DFE719DF58D4859A9FBB6FF49300B6486A5E509CB356DB31EDC1CB80
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 2556c89564b1a9447106c75c6284168be09a3b984211e4ccf81c6626b4114a41
            • Instruction ID: f206e03c2de17d8b79337b68bf377aa3eab8441a1ee2558a9f8cdb55bcc4bac7
            • Opcode Fuzzy Hash: 2556c89564b1a9447106c75c6284168be09a3b984211e4ccf81c6626b4114a41
            • Instruction Fuzzy Hash: F6412B74908341CFDB14DF14C444B5ABBE2BF45318F19889DE8858B362C776E885CB96
            APIs
              • Part of subcall function 006D4D13: FreeLibrary.KERNEL32(00000000,?), ref: 006D4D4D
              • Part of subcall function 006F53CB: __wfsopen.LIBCMT ref: 006F53D6
            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006D4F6F
              • Part of subcall function 006D4CC8: FreeLibrary.KERNEL32(00000000), ref: 006D4D02
              • Part of subcall function 006D4DD0: _memmove.LIBCMT ref: 006D4E1A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Library$Free$Load__wfsopen_memmove
            • String ID:
            • API String ID: 1396898556-0
            • Opcode ID: f3787ac1454692bf03e295ea7bd78e4ad48b5d5e454a7e0c70826d275204903b
            • Instruction ID: 334b07357bb13f3668c19da4edfcc21aba8c59f7ca0b7e913a76c94b384aeb93
            • Opcode Fuzzy Hash: f3787ac1454692bf03e295ea7bd78e4ad48b5d5e454a7e0c70826d275204903b
            • Instruction Fuzzy Hash: FB11EB32A40709ABDB20BF70CC16FAE77A69F40701F10842EF541A63C1DFB55E059764
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: fc0513110e3a689a231e788bcee8cbeb44071f725738aa0b286b898a9c602714
            • Instruction ID: 38c52d76173489782458dbc56dd95328d61f8ab3fe7c4a548c1db953174fdf13
            • Opcode Fuzzy Hash: fc0513110e3a689a231e788bcee8cbeb44071f725738aa0b286b898a9c602714
            • Instruction Fuzzy Hash: 7E2162B0908341CFDB24DF54C844B5ABBE2BF88304F04896CE88A47362C771E849DB97
            APIs
            • __lock_file.LIBCMT ref: 006F4A16
              • Part of subcall function 006F8CA8: __getptd_noexit.LIBCMT ref: 006F8CA8
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __getptd_noexit__lock_file
            • String ID:
            • API String ID: 2597487223-0
            • Opcode ID: aae4b3e43960080fc322bab0b3b2501a78a8e2edca06404ca1e2a7bfa67eca46
            • Instruction ID: f52fb26218650fa6e6d787d557df96bc9a2caafcd425dd46c7403a5bfd8d262f
            • Opcode Fuzzy Hash: aae4b3e43960080fc322bab0b3b2501a78a8e2edca06404ca1e2a7bfa67eca46
            • Instruction Fuzzy Hash: 40F08C3194024DABDF51AF748C063FF36A2AF00365F048558B624AB1A1DF788911DB59
            APIs
            • FreeLibrary.KERNEL32(?,?,007952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006D4FDE
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID:
            • API String ID: 3664257935-0
            • Opcode ID: 8db5cccf8b4630bab0efbb7aaecc6e6c0037e602775f887103b536fb3472b604
            • Instruction ID: 1950ec5db8ea9b67c84ee5f57feb6864a8738587cec08384bf6f1cd92fba0c7e
            • Opcode Fuzzy Hash: 8db5cccf8b4630bab0efbb7aaecc6e6c0037e602775f887103b536fb3472b604
            • Instruction Fuzzy Hash: 19F03971905B12CFCB349F64E494862BBE2AF843293208A3FE2D782720CB31AC40DF40
            APIs
            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006F0930
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: LongNamePath_memmove
            • String ID:
            • API String ID: 2514874351-0
            • Opcode ID: a3afe6f7c4b6830dbcc41f66b1f3ff9cd97f95e7f0b57b0b6c18bc98c782ad06
            • Instruction ID: b9b850268802042f2ad70164a23eb99f173550da93d321f3c1ae85ae291da8a1
            • Opcode Fuzzy Hash: a3afe6f7c4b6830dbcc41f66b1f3ff9cd97f95e7f0b57b0b6c18bc98c782ad06
            • Instruction Fuzzy Hash: 3AE0CD76A0522897C720E6589C05FFA77EDDF88791F0441B6FC0CD7344D9A45C818695
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __wfsopen
            • String ID:
            • API String ID: 197181222-0
            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
            • Instruction ID: 240b776d96947a7023d1f776426a416a9afa487352e39822eb7dea7852a5b6de
            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
            • Instruction Fuzzy Hash: 10B0927644020C77CE012A86EC02A593F5A9B407A4F408020FB0C181A2A6B3AA649689
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 0138B2E9
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: 8ad5da1715d669159b5e8df4054f315fda965676c403bbe6f7fdbb9ef6728f4d
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: B9E0E67494020EDFDB00EFB4D64969D7BB4EF04301F100161FD01D2280D6709E508A62
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0075CBA1
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0075CBFF
            • GetWindowLongW.USER32(?,000000F0), ref: 0075CC40
            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0075CC6A
            • SendMessageW.USER32 ref: 0075CC93
            • _wcsncpy.LIBCMT ref: 0075CCFF
            • GetKeyState.USER32(00000011), ref: 0075CD20
            • GetKeyState.USER32(00000009), ref: 0075CD2D
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0075CD43
            • GetKeyState.USER32(00000010), ref: 0075CD4D
            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0075CD76
            • SendMessageW.USER32 ref: 0075CD9D
            • SendMessageW.USER32(?,00001030,?,0075B37C), ref: 0075CEA1
            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0075CEB7
            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0075CECA
            • SetCapture.USER32(?), ref: 0075CED3
            • ClientToScreen.USER32(?,?), ref: 0075CF38
            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0075CF45
            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0075CF5F
            • ReleaseCapture.USER32 ref: 0075CF6A
            • GetCursorPos.USER32(?), ref: 0075CFA4
            • ScreenToClient.USER32(?,?), ref: 0075CFB1
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0075D00D
            • SendMessageW.USER32 ref: 0075D03B
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0075D078
            • SendMessageW.USER32 ref: 0075D0A7
            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0075D0C8
            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0075D0D7
            • GetCursorPos.USER32(?), ref: 0075D0F7
            • ScreenToClient.USER32(?,?), ref: 0075D104
            • GetParent.USER32(?), ref: 0075D124
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0075D18D
            • SendMessageW.USER32 ref: 0075D1BE
            • ClientToScreen.USER32(?,?), ref: 0075D21C
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0075D24C
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0075D276
            • SendMessageW.USER32 ref: 0075D299
            • ClientToScreen.USER32(?,?), ref: 0075D2EB
            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0075D31F
              • Part of subcall function 006D25DB: GetWindowLongW.USER32(?,000000EB), ref: 006D25EC
            • GetWindowLongW.USER32(?,000000F0), ref: 0075D3BB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
            • String ID: @GUI_DRAGID$F$pby
            • API String ID: 3977979337-733098577
            • Opcode ID: 0903240b2f7bc6791466edad06c88a90ff57dc6b2097ae401ea27e35c6b69d2a
            • Instruction ID: 2b03ec351316106349e1a649e40823273adb9df217fbcf87ca74bc18b02e016d
            • Opcode Fuzzy Hash: 0903240b2f7bc6791466edad06c88a90ff57dc6b2097ae401ea27e35c6b69d2a
            • Instruction Fuzzy Hash: 0642BB70604341AFDB22CF24C844FAABBE5FF49312F14496DF955972A0C7BAD848CB96
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove$_memset
            • String ID: ]x$DEFINE$Oan$P\x$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
            • API String ID: 1357608183-1467149932
            • Opcode ID: 306ff86722e551a0a59e7acd5f9a79733bc88df28aa1c80c3aa13cd86133989d
            • Instruction ID: 7b43b66e991524e2fd1513b442dc504b5ed185434315e37e063849b284b43bd1
            • Opcode Fuzzy Hash: 306ff86722e551a0a59e7acd5f9a79733bc88df28aa1c80c3aa13cd86133989d
            • Instruction Fuzzy Hash: B093B471A00365DFDB24CF59D881BADB7B1FF48710F24816AE945AB381E7789E82CB50
            APIs
            • GetForegroundWindow.USER32(00000000,?), ref: 006D4A3D
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0070D9BE
            • IsIconic.USER32(?), ref: 0070D9C7
            • ShowWindow.USER32(?,00000009), ref: 0070D9D4
            • SetForegroundWindow.USER32(?), ref: 0070D9DE
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0070D9F4
            • GetCurrentThreadId.KERNEL32 ref: 0070D9FB
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0070DA07
            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0070DA18
            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0070DA20
            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0070DA28
            • SetForegroundWindow.USER32(?), ref: 0070DA2B
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070DA40
            • keybd_event.USER32(00000012,00000000), ref: 0070DA4B
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070DA55
            • keybd_event.USER32(00000012,00000000), ref: 0070DA5A
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070DA63
            • keybd_event.USER32(00000012,00000000), ref: 0070DA68
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0070DA72
            • keybd_event.USER32(00000012,00000000), ref: 0070DA77
            • SetForegroundWindow.USER32(?), ref: 0070DA7A
            • AttachThreadInput.USER32(?,?,00000000), ref: 0070DAA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 4125248594-2988720461
            • Opcode ID: d08a71a938b21bcf4766c174e3e2aa75535d683ac5429d1e0de08f0099c571d1
            • Instruction ID: 8e0052377b573b7da6f2f8d6e2603e9bb96d5adbc97248be4547559409c054ee
            • Opcode Fuzzy Hash: d08a71a938b21bcf4766c174e3e2aa75535d683ac5429d1e0de08f0099c571d1
            • Instruction Fuzzy Hash: 92316571A80318BBEB306FA19C49FBF7E6CEB44B51F108025FA05EA1D1D6B45D11ABA4
            APIs
              • Part of subcall function 00728AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00728AED
              • Part of subcall function 00728AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00728B1A
              • Part of subcall function 00728AA3: GetLastError.KERNEL32 ref: 00728B27
            • _memset.LIBCMT ref: 0072867B
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007286CD
            • CloseHandle.KERNEL32(?), ref: 007286DE
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007286F5
            • GetProcessWindowStation.USER32 ref: 0072870E
            • SetProcessWindowStation.USER32(00000000), ref: 00728718
            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00728732
              • Part of subcall function 007284F3: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00728631), ref: 00728508
              • Part of subcall function 007284F3: CloseHandle.KERNEL32(?,?,00728631), ref: 0072851A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
            • String ID: $default$winsta0
            • API String ID: 2063423040-1027155976
            • Opcode ID: 9feaaf03556d4fe52c794a7410864a8e17ecb39c4870a4ff0fc925be98b200e9
            • Instruction ID: 6f5d47f2f9e5d14932900e28815d7cd081a0625d8b5518ecf14ef6f05404f655
            • Opcode Fuzzy Hash: 9feaaf03556d4fe52c794a7410864a8e17ecb39c4870a4ff0fc925be98b200e9
            • Instruction Fuzzy Hash: 6481AF71812229EFDF519FA0EC49AEE7B78EF04304F048129F914A6161DB7A8E04DB22
            APIs
            • OpenClipboard.USER32(0075F910), ref: 007440A6
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 007440B4
            • GetClipboardData.USER32(0000000D), ref: 007440BC
            • CloseClipboard.USER32 ref: 007440C8
            • GlobalLock.KERNEL32(00000000), ref: 007440E4
            • CloseClipboard.USER32 ref: 007440EE
            • GlobalUnlock.KERNEL32(00000000), ref: 00744103
            • IsClipboardFormatAvailable.USER32(00000001), ref: 00744110
            • GetClipboardData.USER32(00000001), ref: 00744118
            • GlobalLock.KERNEL32(00000000), ref: 00744125
            • GlobalUnlock.KERNEL32(00000000), ref: 00744159
            • CloseClipboard.USER32 ref: 00744269
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
            • String ID:
            • API String ID: 3222323430-0
            • Opcode ID: 21bd2d162259a9a7a301b2efe5b6302b1f26f7ec5be973d4ca82f8931498d242
            • Instruction ID: b585a0b6cd6fddb7c061b94fafeece9640f18d20cc82f163d97c8411d881e665
            • Opcode Fuzzy Hash: 21bd2d162259a9a7a301b2efe5b6302b1f26f7ec5be973d4ca82f8931498d242
            • Instruction Fuzzy Hash: 04519075204306ABD310AF64DC85FAF77A8FF84B01F10452EF646D22A1DFB8D9059B6A
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0073C819
            • FindClose.KERNEL32(00000000), ref: 0073C86D
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0073C892
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0073C8A9
            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0073C8D0
            • __swprintf.LIBCMT ref: 0073C91C
            • __swprintf.LIBCMT ref: 0073C95F
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
            • __swprintf.LIBCMT ref: 0073C9B3
              • Part of subcall function 006F3818: __woutput_l.LIBCMT ref: 006F3871
            • __swprintf.LIBCMT ref: 0073CA01
              • Part of subcall function 006F3818: __flsbuf.LIBCMT ref: 006F3893
              • Part of subcall function 006F3818: __flsbuf.LIBCMT ref: 006F38AB
            • __swprintf.LIBCMT ref: 0073CA50
            • __swprintf.LIBCMT ref: 0073CA9F
            • __swprintf.LIBCMT ref: 0073CAEE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
            • API String ID: 3953360268-2428617273
            • Opcode ID: 00da3e2ea49f536b17ce65ef13c10e17a0f672dbaa0f5d8331a36bd1c321ac90
            • Instruction ID: 09799a00763116ebce91e6e783a38025463333324f6e2a9fe33d56d765fe9f41
            • Opcode Fuzzy Hash: 00da3e2ea49f536b17ce65ef13c10e17a0f672dbaa0f5d8331a36bd1c321ac90
            • Instruction Fuzzy Hash: 35A14FB2808314ABC750FB54C886DAFB7EDEF94704F44491EF596D2291EB34DA08CB66
            APIs
            • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 0073F042
            • _wcscmp.LIBCMT ref: 0073F057
            • _wcscmp.LIBCMT ref: 0073F06E
            • GetFileAttributesW.KERNEL32(?), ref: 0073F080
            • SetFileAttributesW.KERNEL32(?,?), ref: 0073F09A
            • FindNextFileW.KERNEL32(00000000,?), ref: 0073F0B2
            • FindClose.KERNEL32(00000000), ref: 0073F0BD
            • FindFirstFileW.KERNEL32(*.*,?), ref: 0073F0D9
            • _wcscmp.LIBCMT ref: 0073F100
            • _wcscmp.LIBCMT ref: 0073F117
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0073F129
            • SetCurrentDirectoryW.KERNEL32(00788920), ref: 0073F147
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0073F151
            • FindClose.KERNEL32(00000000), ref: 0073F15E
            • FindClose.KERNEL32(00000000), ref: 0073F170
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1803514871-438819550
            • Opcode ID: b25dd9df3340a83ad0df5d8714dbdf02daf9f6e1b5b7c5a747193385974dc837
            • Instruction ID: bbf076591674b6de4a51e2af6e6fd499f68f7829bdd2521472a6b844a52afc8f
            • Opcode Fuzzy Hash: b25dd9df3340a83ad0df5d8714dbdf02daf9f6e1b5b7c5a747193385974dc837
            • Instruction Fuzzy Hash: 1131D87290021DAAEF10EBB4EC49AEE77ACAF043A1F104175E904D31A1DB78DA45CB59
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007509DE
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0075F910,00000000,?,00000000,?,?), ref: 00750A4C
            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00750A94
            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00750B1D
            • RegCloseKey.ADVAPI32(?), ref: 00750E3D
            • RegCloseKey.ADVAPI32(00000000), ref: 00750E4A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Close$ConnectCreateRegistryValue
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 536824911-966354055
            • Opcode ID: c7940af9fbaee7cd4346986ceeb8c6ca56a6114327b5f6a1aad62280177c4239
            • Instruction ID: 19dd1579fee536ada4cb3e9d218a8b300491a2115d3a26f2d48e9307d5ee586d
            • Opcode Fuzzy Hash: c7940af9fbaee7cd4346986ceeb8c6ca56a6114327b5f6a1aad62280177c4239
            • Instruction Fuzzy Hash: 43028D756006119FCB54EF24C855E6AB7E6FF88710F08885DF88A9B362CB74ED04CB95
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID: 0Dw$0Ew$0Fw$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oan$UCP)$UTF)$UTF16)$pGw
            • API String ID: 0-1771680070
            • Opcode ID: e7d9e4d730c6005bb61e5a23f1574a042c7e476560b2c1294c56ee7182882788
            • Instruction ID: f7a25384441e75f66f55cd934314f59a85ed541ca88b2fdec7eaf581e5e52811
            • Opcode Fuzzy Hash: e7d9e4d730c6005bb61e5a23f1574a042c7e476560b2c1294c56ee7182882788
            • Instruction Fuzzy Hash: 70728171E00369DBDB24CF59D8407AEB7B6FF64750F54816AE809EB280EB349D81CB90
            APIs
            • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 0073F19F
            • _wcscmp.LIBCMT ref: 0073F1B4
            • _wcscmp.LIBCMT ref: 0073F1CB
              • Part of subcall function 007343C6: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007343E1
            • FindNextFileW.KERNEL32(00000000,?), ref: 0073F1FA
            • FindClose.KERNEL32(00000000), ref: 0073F205
            • FindFirstFileW.KERNEL32(*.*,?), ref: 0073F221
            • _wcscmp.LIBCMT ref: 0073F248
            • _wcscmp.LIBCMT ref: 0073F25F
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0073F271
            • SetCurrentDirectoryW.KERNEL32(00788920), ref: 0073F28F
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0073F299
            • FindClose.KERNEL32(00000000), ref: 0073F2A6
            • FindClose.KERNEL32(00000000), ref: 0073F2B8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 1824444939-438819550
            • Opcode ID: 124eeee05fe08a6f540144a5bc505ea084e85b943b5632d3d0eea652662e389b
            • Instruction ID: b1e375130c952b35aa20d5c352fd019587235a85961a55ba031f4ed00fba30b3
            • Opcode Fuzzy Hash: 124eeee05fe08a6f540144a5bc505ea084e85b943b5632d3d0eea652662e389b
            • Instruction Fuzzy Hash: 6731FA7590161DAEEF10AFA4EC48EEF73ACAF053A1F104175E900E31A1DB78DE45CA58
            APIs
            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0073A299
            • __swprintf.LIBCMT ref: 0073A2BB
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0073A2F8
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0073A31D
            • _memset.LIBCMT ref: 0073A33C
            • _wcsncpy.LIBCMT ref: 0073A378
            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0073A3AD
            • CloseHandle.KERNEL32(00000000), ref: 0073A3B8
            • RemoveDirectoryW.KERNEL32(?), ref: 0073A3C1
            • CloseHandle.KERNEL32(00000000), ref: 0073A3CB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
            • String ID: :$\$\??\%s
            • API String ID: 2733774712-3457252023
            • Opcode ID: c9806f14e9db6826285c878e3f5a474106dc978b0518db7a494ffa848985e079
            • Instruction ID: 71a7cb17e712ad8d85c3d94e8e638183a96504e4a3884c3ceb03fe8af22c0786
            • Opcode Fuzzy Hash: c9806f14e9db6826285c878e3f5a474106dc978b0518db7a494ffa848985e079
            • Instruction Fuzzy Hash: D731B3B150020AABEB20DFA0DC45FEB77BDEF88741F1041B6F648D6161EB7896448B25
            APIs
              • Part of subcall function 0072852A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00728546
              • Part of subcall function 0072852A: GetLastError.KERNEL32(?,0072800A,?,?,?), ref: 00728550
              • Part of subcall function 0072852A: GetProcessHeap.KERNEL32(00000008,?,?,0072800A,?,?,?), ref: 0072855F
              • Part of subcall function 0072852A: HeapAlloc.KERNEL32(00000000,?,0072800A,?,?,?), ref: 00728566
              • Part of subcall function 0072852A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0072857D
              • Part of subcall function 007285C7: GetProcessHeap.KERNEL32(00000008,00728020,00000000,00000000,?,00728020,?), ref: 007285D3
              • Part of subcall function 007285C7: HeapAlloc.KERNEL32(00000000,?,00728020,?), ref: 007285DA
              • Part of subcall function 007285C7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00728020,?), ref: 007285EB
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00728238
            • _memset.LIBCMT ref: 0072824D
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0072826C
            • GetLengthSid.ADVAPI32(?), ref: 0072827D
            • GetAce.ADVAPI32(?,00000000,?), ref: 007282BA
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007282D6
            • GetLengthSid.ADVAPI32(?), ref: 007282F3
            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00728302
            • HeapAlloc.KERNEL32(00000000), ref: 00728309
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0072832A
            • CopySid.ADVAPI32(00000000), ref: 00728331
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00728362
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00728388
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0072839C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3996160137-0
            • Opcode ID: 239e2c625e883e84eef259368f9f3a93c4301c1251fd8a2a205e278ac554aefb
            • Instruction ID: c9bf2ea2cf94c6f71373fe84aad509fface90c28efa2283854725e9131d10cfc
            • Opcode Fuzzy Hash: 239e2c625e883e84eef259368f9f3a93c4301c1251fd8a2a205e278ac554aefb
            • Instruction Fuzzy Hash: 9A616C71901219EFDF10DFA4EC44AEEBB79FF04711F048129F915A7291DB7A9A10CBA1
            APIs
              • Part of subcall function 00750EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0074FE38,?,?), ref: 00750EBC
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00750537
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007505D6
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0075066E
            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 007508AD
            • RegCloseKey.ADVAPI32(00000000), ref: 007508BA
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
            • String ID:
            • API String ID: 1240663315-0
            • Opcode ID: 03bbc677bbcc4c46af588b3fce67236990e8994327685d14348e225e0c00fab4
            • Instruction ID: a102848a433f83dd421383c5930fa8abd27ea464d5e9cb11e3e4526c16710c19
            • Opcode Fuzzy Hash: 03bbc677bbcc4c46af588b3fce67236990e8994327685d14348e225e0c00fab4
            • Instruction Fuzzy Hash: C6E15D31604310AFCB14DF25C895E6ABBE5EF88714F04896DF84ADB262DB74ED05CB91
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID: 0Dw$0Dw$ERCP$Oan$VUUU$VUUU$VUUU$VUUU
            • API String ID: 0-4025930724
            • Opcode ID: 79c2bdcb399353b13da8ab1c4048c474e5d40a7e8cc74a0b9df60dfb36fa7861
            • Instruction ID: 2662698a3d507b39f4af3768d9d108e4eafe6084bc6cb2dbae4f191695498c9e
            • Opcode Fuzzy Hash: 79c2bdcb399353b13da8ab1c4048c474e5d40a7e8cc74a0b9df60dfb36fa7861
            • Instruction Fuzzy Hash: D6A27070E0525ACBDF28CF69C9507EEB7B2BB54314F2481A9D855A7380EB349EC5CB90
            APIs
            • GetKeyboardState.USER32(?), ref: 00730062
            • GetAsyncKeyState.USER32(000000A0), ref: 007300E3
            • GetKeyState.USER32(000000A0), ref: 007300FE
            • GetAsyncKeyState.USER32(000000A1), ref: 00730118
            • GetKeyState.USER32(000000A1), ref: 0073012D
            • GetAsyncKeyState.USER32(00000011), ref: 00730145
            • GetKeyState.USER32(00000011), ref: 00730157
            • GetAsyncKeyState.USER32(00000012), ref: 0073016F
            • GetKeyState.USER32(00000012), ref: 00730181
            • GetAsyncKeyState.USER32(0000005B), ref: 00730199
            • GetKeyState.USER32(0000005B), ref: 007301AB
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: acd1c753433fb9cdbd86d97f263a30253512e91c2612e05198f6d5750a8171bf
            • Instruction ID: 42d16c514b2a5c8bf3e8d5d4f359a1a67dd75fb7d77ff56117d1b920953d6eaf
            • Opcode Fuzzy Hash: acd1c753433fb9cdbd86d97f263a30253512e91c2612e05198f6d5750a8171bf
            • Instruction Fuzzy Hash: FD41C8346047CE69FF359A6488243BABEA1AF11340F088099D5C6571C3EBDC99D4C7E6
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
            • String ID:
            • API String ID: 1737998785-0
            • Opcode ID: 14fe67cdeba284b662b39cc8a421335adad4fc6ef00d2c4416633eb3ef039b72
            • Instruction ID: 4f31c08078354564a156c1acb32d6e4ead642cf7ae4665f0373b85d887ed36ec
            • Opcode Fuzzy Hash: 14fe67cdeba284b662b39cc8a421335adad4fc6ef00d2c4416633eb3ef039b72
            • Instruction Fuzzy Hash: D721B535200220DFDB10AF60EC49BAE77A8FF04711F14C01AF946DB2A1DB78AC01CB58
            APIs
              • Part of subcall function 006D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006D48A1,?,?,006D37C0,?), ref: 006D48CE
              • Part of subcall function 00734AD8: GetFileAttributesW.KERNEL32(?,0073374F), ref: 00734AD9
            • FindFirstFileW.KERNEL32(?,?), ref: 007338E7
            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0073398F
            • MoveFileW.KERNEL32(?,?), ref: 007339A2
            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 007339BF
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 007339E1
            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 007339FD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
            • String ID: \*.*
            • API String ID: 4002782344-1173974218
            • Opcode ID: ee93afa0cf8fd5ce3911f418cca8c6807ee1d2f442d218646edeff78da5cf857
            • Instruction ID: defbe73c3f6abee81cae223090d8e124e305db52506df94efac526959675cdaf
            • Opcode Fuzzy Hash: ee93afa0cf8fd5ce3911f418cca8c6807ee1d2f442d218646edeff78da5cf857
            • Instruction Fuzzy Hash: 4F51C231C0520D9BDF25EBA0CD92AEDB779AF14301F64416AE40277292EF746F09CBA5
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0073F4CC
            • Sleep.KERNEL32(0000000A), ref: 0073F4FC
            • _wcscmp.LIBCMT ref: 0073F510
            • _wcscmp.LIBCMT ref: 0073F52B
            • FindNextFileW.KERNEL32(?,?), ref: 0073F5C9
            • FindClose.KERNEL32(00000000), ref: 0073F5DF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
            • String ID: *.*
            • API String ID: 713712311-438819550
            • Opcode ID: b303faf81538244ae16a5e9a6ebdd0147f7ad84962f21c7a3258ec0bb8942c12
            • Instruction ID: f501a059ee6502d591c755baa7041445e88a70ee29270f5d99ee925de9ff278f
            • Opcode Fuzzy Hash: b303faf81538244ae16a5e9a6ebdd0147f7ad84962f21c7a3258ec0bb8942c12
            • Instruction Fuzzy Hash: 2E416D71D0021AABDF50DFA4CC49AEEBBB5FF05350F14456AF815A32A2EB349E54CB90
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: 657e2cd4aceac7e98c98c2b5aa6ed20cbbe6ef4434abdfb5f107b18bfa273591
            • Instruction ID: 708671981e1a8df6e84a3602c1f92708d21a2fddb6da186854cad103cefdc8d5
            • Opcode Fuzzy Hash: 657e2cd4aceac7e98c98c2b5aa6ed20cbbe6ef4434abdfb5f107b18bfa273591
            • Instruction Fuzzy Hash: FF12BD70A01619DFDF14CFA5D981AEEB7F6FF48304F108529E806A7252EB39AD11CB64
            APIs
              • Part of subcall function 006F0F36: std::exception::exception.LIBCMT ref: 006F0F6C
              • Part of subcall function 006F0F36: __CxxThrowException@8.LIBCMT ref: 006F0F81
            • _memmove.LIBCMT ref: 007205AE
            • _memmove.LIBCMT ref: 007206C3
            • _memmove.LIBCMT ref: 0072076A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove$Exception@8Throwstd::exception::exception
            • String ID: yZn
            • API String ID: 1300846289-1312781132
            • Opcode ID: ab03dc3f6ee64142e537b61d216f02e1821f1590485942a0ad62c4672bb72dbe
            • Instruction ID: 66208e29f1b16e56fec4654bb5dd89401ce677c63293bea9b5f02a7b9737bd06
            • Opcode Fuzzy Hash: ab03dc3f6ee64142e537b61d216f02e1821f1590485942a0ad62c4672bb72dbe
            • Instruction Fuzzy Hash: 5102B070E01219DFDF04DF65D981AAEBBB6EF44300F148069E80ADB356EB34DA51CBA5
            APIs
              • Part of subcall function 00728AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00728AED
              • Part of subcall function 00728AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00728B1A
              • Part of subcall function 00728AA3: GetLastError.KERNEL32 ref: 00728B27
            • ExitWindowsEx.USER32(?,00000000), ref: 007352A0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
            • String ID: $@$SeShutdownPrivilege
            • API String ID: 2234035333-194228
            • Opcode ID: aa99034671930304e0ffaadfb28ca6058ea087c36bd9c5f53512db72ca01c03e
            • Instruction ID: 47ba97652e59bfe658497db287ac238ee68fb4a4c1746379cbeaa22e79c7d8f3
            • Opcode Fuzzy Hash: aa99034671930304e0ffaadfb28ca6058ea087c36bd9c5f53512db72ca01c03e
            • Instruction Fuzzy Hash: 9F0126B2695712ABF7283678AC4BBBB72A8FB09742F244125FC57D20D3E9AD5C0081D4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __itow__swprintf
            • String ID: Oan
            • API String ID: 674341424-1382745430
            • Opcode ID: d22c14e96365543f3937a027e626518fef987c470af5bd1cd60323df8feca323
            • Instruction ID: c2a4fcd7e56934d1a7e01d8a8debabdb97427f60521dbbc1800945905f74683d
            • Opcode Fuzzy Hash: d22c14e96365543f3937a027e626518fef987c470af5bd1cd60323df8feca323
            • Instruction Fuzzy Hash: 1822CB715083519FC724DF28C885BAFB7E6AF84304F10492DF89A97391EB34EA45CB92
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007463F2
            • WSAGetLastError.WSOCK32(00000000), ref: 00746401
            • bind.WSOCK32(00000000,?,00000010), ref: 0074641D
            • listen.WSOCK32(00000000,00000005), ref: 0074642C
            • WSAGetLastError.WSOCK32(00000000), ref: 00746446
            • closesocket.WSOCK32(00000000,00000000), ref: 0074645A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorLast$bindclosesocketlistensocket
            • String ID:
            • API String ID: 1279440585-0
            • Opcode ID: 7151225dc69b0b1db358e379831b5e9b352b7a9ea906df8c04060c454e50e6d6
            • Instruction ID: c8c605ff65ee9b7f2c485262a2171014a748c86ecaf0aa8187849dd01101a51b
            • Opcode Fuzzy Hash: 7151225dc69b0b1db358e379831b5e9b352b7a9ea906df8c04060c454e50e6d6
            • Instruction Fuzzy Hash: 9B210131600214AFCB10EF68C849B6EB3E9EF49720F148569F856A7391CB78AD01CB66
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • DefDlgProcW.USER32(?,?,?,?,?), ref: 006D19FA
            • GetSysColor.USER32(0000000F), ref: 006D1A4E
            • SetBkColor.GDI32(?,00000000), ref: 006D1A61
              • Part of subcall function 006D1290: DefDlgProcW.USER32(?,00000020,?), ref: 006D12D8
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ColorProc$LongWindow
            • String ID:
            • API String ID: 3744519093-0
            • Opcode ID: d5e476ca0fa3bec7e8fb68a36678610ae5bcccda8e0944b4bbcafab3168e99ec
            • Instruction ID: af12ad529cf87e7d4e6b54c4c4aee0f39db924692ca863dc66162f199cd3b1b5
            • Opcode Fuzzy Hash: d5e476ca0fa3bec7e8fb68a36678610ae5bcccda8e0944b4bbcafab3168e99ec
            • Instruction Fuzzy Hash: C8A158B0901694FEE635AB298C58EFB359FDB43342B18421BF402DD3D5DBA89E028275
            APIs
              • Part of subcall function 00747EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00747ECB
            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 007468B4
            • WSAGetLastError.WSOCK32(00000000), ref: 007468DD
            • bind.WSOCK32(00000000,?,00000010), ref: 00746916
            • WSAGetLastError.WSOCK32(00000000), ref: 00746923
            • closesocket.WSOCK32(00000000,00000000), ref: 00746937
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorLast$bindclosesocketinet_addrsocket
            • String ID:
            • API String ID: 99427753-0
            • Opcode ID: 2ca16fda340d0f9cb930743ac284a6aa87021fbb490cd59fb623fba4125bc515
            • Instruction ID: 713e35cd28d1536ab4bcd800bb3d80f10b1ec444b24caad0c816cd28988bb311
            • Opcode Fuzzy Hash: 2ca16fda340d0f9cb930743ac284a6aa87021fbb490cd59fb623fba4125bc515
            • Instruction Fuzzy Hash: 3841C375A00210AFEB50BF649C86F6E77AADF08710F44805DF91AAB3C2DB749D008BA5
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: ead5c8b716f7ec6e68cd6f6148fcb98d9be790d81aacfc32c56eaf9268b4b1ed
            • Instruction ID: b4c0641422126b694e29ddf1ea4d80f832003b3fd13bf20fb636b65df52af829
            • Opcode Fuzzy Hash: ead5c8b716f7ec6e68cd6f6148fcb98d9be790d81aacfc32c56eaf9268b4b1ed
            • Instruction Fuzzy Hash: A7112B31B006605FD7216F27DC64BAE7799FF44723B058029FC46C7251CBB8D842C6A8
            APIs
            • CoInitialize.OLE32(00000000), ref: 0073C4BE
            • CoCreateInstance.OLE32(00762D6C,00000000,00000001,00762BDC,?), ref: 0073C4D6
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
            • CoUninitialize.OLE32 ref: 0073C743
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_memmove
            • String ID: .lnk
            • API String ID: 2683427295-24824748
            • Opcode ID: 331ceafffa9e9ced7611bda477d4ceb0525aeabd9f6856bb365c8bb58eed032b
            • Instruction ID: f91ec0aeac72c20e385bd4d8f4b6932f2d373dcb906b4f8201cd055c01c64bc1
            • Opcode Fuzzy Hash: 331ceafffa9e9ced7611bda477d4ceb0525aeabd9f6856bb365c8bb58eed032b
            • Instruction Fuzzy Hash: BFA14D71508305AFD340EF54C891EABB7EDEF98304F04491DF55697292EB70EA09CBA6
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,00711CB7,?), ref: 0074C112
            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0074C124
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetSystemWow64DirectoryW$kernel32.dll
            • API String ID: 2574300362-1816364905
            • Opcode ID: b34a5b81b59eb6723bb79d805bd104572d816fccd01ca19ddd3d977a4cc3306d
            • Instruction ID: 8f6c34c7b62205acd43ec795255afd02964bd8457f3b1fdbf0b406b98d703297
            • Opcode Fuzzy Hash: b34a5b81b59eb6723bb79d805bd104572d816fccd01ca19ddd3d977a4cc3306d
            • Instruction Fuzzy Hash: 8BE012F8611B27CFD7616F35D818A9276E4EF09756F44C439E885D26A0E7BCD840C750
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 0074EF51
            • Process32FirstW.KERNEL32(00000000,?), ref: 0074EF5F
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
            • Process32NextW.KERNEL32(00000000,?), ref: 0074F01F
            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0074F02E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
            • String ID:
            • API String ID: 2576544623-0
            • Opcode ID: 1a674e1e19310bc11f184bc0816cf6ac529c880c402aac61acebb6a91ae34d90
            • Instruction ID: c4e5aab5927d4fb066f39d0b99d2077eb348140dd016237cb2d8d06f97539a59
            • Opcode Fuzzy Hash: 1a674e1e19310bc11f184bc0816cf6ac529c880c402aac61acebb6a91ae34d90
            • Instruction Fuzzy Hash: 18519071904711AFD350EF24DC85E6BB7E9FF84710F14482EF59687262EB70A908CB96
            APIs
            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0072E93A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: lstrlen
            • String ID: ($|
            • API String ID: 1659193697-1631851259
            • Opcode ID: 71bd58264f91f9de58802c47e1c4cb6d6d8988cb40a1bc46943a611df9f8669d
            • Instruction ID: 5e0640e1830a329df7ef9e7c471eb3988328ce40368e3f43cc9b2455a3f36650
            • Opcode Fuzzy Hash: 71bd58264f91f9de58802c47e1c4cb6d6d8988cb40a1bc46943a611df9f8669d
            • Instruction Fuzzy Hash: 97323675A00615DFDB28CF29D48196AB7F0FF48320B15C56EE89ADB3A1E770E981CB40
            APIs
            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00741920,00000000), ref: 007424F7
            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0074252E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Internet$AvailableDataFileQueryRead
            • String ID:
            • API String ID: 599397726-0
            • Opcode ID: 15db2aecb6fd8b363d9e911eb798bef08f8d286f8936e593cb451253dfff9a28
            • Instruction ID: 7e3d4874fc52a3f21a46f2b368ad92d9d04e2cd43169c91d6d08a6a198aaac7b
            • Opcode Fuzzy Hash: 15db2aecb6fd8b363d9e911eb798bef08f8d286f8936e593cb451253dfff9a28
            • Instruction Fuzzy Hash: C641FA71604309FFEB20DE95DC85EBBB7BCEB40324F50406EF605A7142DB789E629664
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0073B3CF
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0073B429
            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0073B476
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID:
            • API String ID: 1682464887-0
            • Opcode ID: e52c1db60824d3cb74c1e6197cc64ac99c7dc32e2b56fc70ea38e5b9539c2261
            • Instruction ID: 1850e9cda0f5b09fa52535376bd3e9d9b1db724fa28017ee894bdfdd75c69a70
            • Opcode Fuzzy Hash: e52c1db60824d3cb74c1e6197cc64ac99c7dc32e2b56fc70ea38e5b9539c2261
            • Instruction Fuzzy Hash: 92217175A00618EFDB00EFA5D884EEDBBB8FF48310F1480AAF905AB352CB359915CB54
            APIs
              • Part of subcall function 006F0F36: std::exception::exception.LIBCMT ref: 006F0F6C
              • Part of subcall function 006F0F36: __CxxThrowException@8.LIBCMT ref: 006F0F81
            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00728AED
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00728B1A
            • GetLastError.KERNEL32 ref: 00728B27
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
            • String ID:
            • API String ID: 1922334811-0
            • Opcode ID: fdb018fd792f4145a846f0568e8cd204dff22d4a9f35f675e00eaf47a6ab2676
            • Instruction ID: 77fc583799ba919bf93b509f63e55fd99449088155538535d92661bfe79e5048
            • Opcode Fuzzy Hash: fdb018fd792f4145a846f0568e8cd204dff22d4a9f35f675e00eaf47a6ab2676
            • Instruction Fuzzy Hash: 5B11BFB1515308AFE728AF54EC86D6BB7B9EB44311B20C16EF45593641EB75AC00CA64
            APIs
            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00734A31
            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00734A48
            • FreeSid.ADVAPI32(?), ref: 00734A58
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AllocateCheckFreeInitializeMembershipToken
            • String ID:
            • API String ID: 3429775523-0
            • Opcode ID: 7f21eaf1ff9958706ebe1a480b2305bc0f2bb044c05db7c31b16b74f69c6a0b9
            • Instruction ID: 0fc263a62d166bcfb2355bbe49f91a02bd3b59ecc15d35575a6413dcf0667210
            • Opcode Fuzzy Hash: 7f21eaf1ff9958706ebe1a480b2305bc0f2bb044c05db7c31b16b74f69c6a0b9
            • Instruction Fuzzy Hash: F7F04F75A5130CBFDF04DFF0DC89AEEBBBCEF08211F008469E505E2181D6746A048B54
            APIs
            • __time64.LIBCMT ref: 00738944
              • Part of subcall function 006F537A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00739017,00000000,?,?,?,?,007391C8,00000000,?), ref: 006F5383
              • Part of subcall function 006F537A: __aulldiv.LIBCMT ref: 006F53A3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Time$FileSystem__aulldiv__time64
            • String ID: 0ey
            • API String ID: 2893107130-3933825784
            • Opcode ID: 314c4b3356af46fb3a54fe7f76cec65d8478b7e4340f512ccaac42c188544e26
            • Instruction ID: 54fee2731c9e1f67a62fefc73512385b51b3706853ea93b68cb0d57d93145c86
            • Opcode Fuzzy Hash: 314c4b3356af46fb3a54fe7f76cec65d8478b7e4340f512ccaac42c188544e26
            • Instruction Fuzzy Hash: 2021B472635610CBD729CF29D441B62B3E1EBA5310F298F6DE1E5CB2D0CA78B905CB54
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 345c831371183904b8337ee5dbd8089279e0f11d66b54e89f014c999ddb50a8c
            • Instruction ID: 09b287415a88ff66134af38bd4bc12cd904a1df6448b7826f4fe1ae648dce947
            • Opcode Fuzzy Hash: 345c831371183904b8337ee5dbd8089279e0f11d66b54e89f014c999ddb50a8c
            • Instruction Fuzzy Hash: 8C228D75E00215CFDB24EF58C481ABEB7F2FF08310F14816AE9569B381E776A985CB91
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0073C787
            • FindClose.KERNEL32(00000000), ref: 0073C7B7
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: 2a64e3152ef0f3834407efa20d9c923e73facd20702cacb20871a046a9592e94
            • Instruction ID: ef6a7e0960c2c675585be216120a8e1e9a56a10fc05fbc39b120b1ff3b11b9e2
            • Opcode Fuzzy Hash: 2a64e3152ef0f3834407efa20d9c923e73facd20702cacb20871a046a9592e94
            • Instruction Fuzzy Hash: 1711A1726002109FD710EF29D849A2AF7E9FF84320F04851EF9A9D73A1DB74AC00CB95
            APIs
            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0074957D,?,0075FB84,?), ref: 0073A121
            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0074957D,?,0075FB84,?), ref: 0073A133
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorFormatLastMessage
            • String ID:
            • API String ID: 3479602957-0
            • Opcode ID: 8f574ad2ac7938984e570eb147ed67effb5e08ac7218fd17b51bdac1f72a6532
            • Instruction ID: 9755383cb4dc2b434b2a822c4c2556c6189a87631a3604e2740faf1f3ee109a2
            • Opcode Fuzzy Hash: 8f574ad2ac7938984e570eb147ed67effb5e08ac7218fd17b51bdac1f72a6532
            • Instruction Fuzzy Hash: DAF05E7550522DFBEB20ABA4CC49FEA776DBF08361F008266F909D6281D6749940CBA1
            APIs
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00728631), ref: 00728508
            • CloseHandle.KERNEL32(?,?,00728631), ref: 0072851A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AdjustCloseHandlePrivilegesToken
            • String ID:
            • API String ID: 81990902-0
            • Opcode ID: 77036d8acc981c29a321c491a6d8a04431338bd930dbb7de33a3cbb0619716f5
            • Instruction ID: 9d08e42e8dacf5747ed762d9d2ad8c636c95f7ec47274695192896126ae8ac23
            • Opcode Fuzzy Hash: 77036d8acc981c29a321c491a6d8a04431338bd930dbb7de33a3cbb0619716f5
            • Instruction Fuzzy Hash: 31E08C32005610AFFB612F20FC08DB77BEAEF00311724C82DF99680471DB62ACA0DB54
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,006F8ED7,?,?,?,00000001), ref: 006FA2DA
            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 006FA2E3
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: ab5b57990e0ff42989defd9161060ada092461d7535a8e9f4ee45063304972db
            • Instruction ID: cbeca91d90c7bb436d75edb79d741ba2d2006d53c438655129d04ae8825a3bf9
            • Opcode Fuzzy Hash: ab5b57990e0ff42989defd9161060ada092461d7535a8e9f4ee45063304972db
            • Instruction Fuzzy Hash: 3FB09231054308ABEA002F91ED09BC93F68EB44AA3F408020F60D84070CBA654508A99
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9607ab3461df31b78389d913391e9fd8ec148fdf74827556932c562ae35cefa7
            • Instruction ID: 1421520f0b6f85b5c10b5419fcb5901a51a19622efbbb1bae4c3d22bc72849da
            • Opcode Fuzzy Hash: 9607ab3461df31b78389d913391e9fd8ec148fdf74827556932c562ae35cefa7
            • Instruction Fuzzy Hash: B8323662D29F454DD7279735C832336A24AAFB73C8F14D737F82AB5AA5EB68C4834104
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dfc6c85b0898dc42763eecc88b4034775aa1a6fd8c8da2235d30cbbafc99f54e
            • Instruction ID: d80bd162ea637db3ebb4587f7e63a8a645f46a7a0aa42f0514cbdcc14a74c84b
            • Opcode Fuzzy Hash: dfc6c85b0898dc42763eecc88b4034775aa1a6fd8c8da2235d30cbbafc99f54e
            • Instruction Fuzzy Hash: 63B11F21E2AF404DD32396398835336BA8CAFBB2C5F51D31BFC2774E62EB6685834545
            APIs
            • BlockInput.USER32(00000001), ref: 0074403A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: 19b797236ca3273737b0de4a41712c8013ec2225265f62b6849b73048dc51183
            • Instruction ID: 772f281e250020ec9c7359343c10f7c86df50d2e6b7ebc67a8c2dbd69d81d687
            • Opcode Fuzzy Hash: 19b797236ca3273737b0de4a41712c8013ec2225265f62b6849b73048dc51183
            • Instruction Fuzzy Hash: DBE048322102145FC760AF59D404B96FBD9EF64761F00C05AFD49C7361DB74E8508BA4
            APIs
            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00734D1D
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: mouse_event
            • String ID:
            • API String ID: 2434400541-0
            • Opcode ID: 1d25577fc96d3ad79102a179682799ec53be70c208717b01a623e4b6d5b5f19a
            • Instruction ID: 9866b52df440e1bf007c5a8ef3c1ba8c35adc3a3f92b61cdc524f4e122b01134
            • Opcode Fuzzy Hash: 1d25577fc96d3ad79102a179682799ec53be70c208717b01a623e4b6d5b5f19a
            • Instruction Fuzzy Hash: 44D09EA437460579FCAC0B309C1FB761119F300796FA4554977029A2C7B8EC7841A436
            APIs
            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007286B1), ref: 00728A93
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 59304c250d44974475b5b3530cd037c1dc898038194889670fe6076f9ebc5d71
            • Instruction ID: 5f60c5b46e00959e05142414c0c45782f224715772bc51e1982b7774fd3ea5ec
            • Opcode Fuzzy Hash: 59304c250d44974475b5b3530cd037c1dc898038194889670fe6076f9ebc5d71
            • Instruction Fuzzy Hash: F1D05E3226060EABEF018EA4DC01EEE3B69EB04B01F408111FE15C50A1C7B5D835AB60
            APIs
            • GetUserNameW.ADVAPI32(?,?), ref: 00712171
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: fc68e4ef612192c58799fd2aad732b51d1fc4af2bccf858346db15719c4d7deb
            • Instruction ID: e4a8f1904397ae3e697a98bd0cc5d9fbb4fd91a1040c24a0377a45f30a2db459
            • Opcode Fuzzy Hash: fc68e4ef612192c58799fd2aad732b51d1fc4af2bccf858346db15719c4d7deb
            • Instruction Fuzzy Hash: C1C04CF1801109DBCB05DB90D988DFE77BCAB04315F148055E105F2140D7789B448B71
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 006FA2AA
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 059c1ea6d46cfb8a92f06533e2a2545dbf77a09abf5c8f6e17d094b5206f7e1d
            • Instruction ID: 19578f34d7fff65eb4ecb7015eb0f767de98a409101956b5771b5cc85d9f2b1b
            • Opcode Fuzzy Hash: 059c1ea6d46cfb8a92f06533e2a2545dbf77a09abf5c8f6e17d094b5206f7e1d
            • Instruction Fuzzy Hash: 77A0113000020CAB8A002F82EC08888BFACEA002A2B008020F80C800328BB2A8208A88
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21576ed3fdc2af2e8f210329d5313d559df859a65f187a364e8c99942bf21afb
            • Instruction ID: 9f913b0240aa2c2dbb714b0179b627a04d34ba986bc0fd91c8c2aead56ff4649
            • Opcode Fuzzy Hash: 21576ed3fdc2af2e8f210329d5313d559df859a65f187a364e8c99942bf21afb
            • Instruction Fuzzy Hash: B5220770A01BE58FDF388B1AD8946BCB7A3FB01304F78846AD859DB691DB389D81C751
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
            • Instruction ID: 3f6a989578e9799c7a63de13957bc8bc6cdcdbf958c0e3ae1f1dee9f264b3be4
            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
            • Instruction Fuzzy Hash: F9C174722160974ADF2D463AC4340BEBFE25AA37B231A175DE5B2CF2D5EF10C564DA20
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
            • Instruction ID: 1d244b6bba0d10492d092ec7ede7ca29ba616fefa5d95c312a28e0601108a79d
            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
            • Instruction Fuzzy Hash: FCC1843221619749DB2D463A847407EBFE25AA37B231A176DE5B2DF2C4EF10C524DA20
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction ID: 3676d3fc21542696c86ce6d6c88153e505272a3a39b66e504bde8248f6eb5fe1
            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction Fuzzy Hash: 7541D571D1051CDBCF48CFADC991AEEBBF1AF88201F548299D516AB345D730AB41DB90
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction ID: c7033c4596c354a3444ba06d43d393cb79f3d4139694efd75f8583f5e4f8e042
            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction Fuzzy Hash: 7E019278A00209EFCB44EF99C5909AEF7F5FB48314F208599D809A7701D730AE41DB90
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction ID: 2389c5001d3a1726e72b3b0a45d5e24db2290c2803eb2fcb7927b29feeec976b
            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction Fuzzy Hash: CC019279A00209EFCB44EF99C5909AEF7B5FB88314F20859AD809A7701D730AE41DB90
            Memory Dump Source
            • Source File: 00000000.00000002.1448929528.0000000001389000.00000040.00000020.00020000.00000000.sdmp, Offset: 01389000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1389000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
            APIs
            • DeleteObject.GDI32(00000000), ref: 00747970
            • DeleteObject.GDI32(00000000), ref: 00747982
            • DestroyWindow.USER32 ref: 00747990
            • GetDesktopWindow.USER32 ref: 007479AA
            • GetWindowRect.USER32(00000000), ref: 007479B1
            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00747AF2
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00747B02
            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747B4A
            • GetClientRect.USER32(00000000,?), ref: 00747B56
            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00747B90
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747BB2
            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747BC5
            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747BD0
            • GlobalLock.KERNEL32(00000000), ref: 00747BD9
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747BE8
            • GlobalUnlock.KERNEL32(00000000), ref: 00747BF1
            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747BF8
            • GlobalFree.KERNEL32(00000000), ref: 00747C03
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747C15
            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00762CAC,00000000), ref: 00747C2B
            • GlobalFree.KERNEL32(00000000), ref: 00747C3B
            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00747C61
            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00747C80
            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747CA2
            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00747E8F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 2211948467-2373415609
            • Opcode ID: 8e1022d564a6a47fcb4c016a9f4f95c18f5c19a5983cfc7cff4e60cde8bc922d
            • Instruction ID: 40666ac75785fe33507db1d3211fbd5e00c4974dadee0c02984c5a13297e9ad1
            • Opcode Fuzzy Hash: 8e1022d564a6a47fcb4c016a9f4f95c18f5c19a5983cfc7cff4e60cde8bc922d
            • Instruction Fuzzy Hash: ED02A171A00219EFDB14DF68CC89EAE7BB9FF48311F148159F905AB2A1D778AD01CB64
            APIs
            • CharUpperBuffW.USER32(?,?,0075F910), ref: 00753690
            • IsWindowVisible.USER32(?), ref: 007536B4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BuffCharUpperVisibleWindow
            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
            • API String ID: 4105515805-45149045
            • Opcode ID: f024fc4afe6a5399f19aa581d1be01420a6ec397b9bc9955a3200f09b3b053a5
            • Instruction ID: 824a57fc86e22e3acfdbfbfd51e0f71ae0bda760b01ee77f8152232e83693ae1
            • Opcode Fuzzy Hash: f024fc4afe6a5399f19aa581d1be01420a6ec397b9bc9955a3200f09b3b053a5
            • Instruction Fuzzy Hash: CAD17E306043019BCB14EF10C591ABA77A6AF95385F18846CFD865B3B3CB79EE0ACB55
            APIs
            • SetTextColor.GDI32(?,00000000), ref: 0075A662
            • GetSysColorBrush.USER32(0000000F), ref: 0075A693
            • GetSysColor.USER32(0000000F), ref: 0075A69F
            • SetBkColor.GDI32(?,000000FF), ref: 0075A6B9
            • SelectObject.GDI32(?,00000000), ref: 0075A6C8
            • InflateRect.USER32(?,000000FF,000000FF), ref: 0075A6F3
            • GetSysColor.USER32(00000010), ref: 0075A6FB
            • CreateSolidBrush.GDI32(00000000), ref: 0075A702
            • FrameRect.USER32(?,?,00000000), ref: 0075A711
            • DeleteObject.GDI32(00000000), ref: 0075A718
            • InflateRect.USER32(?,000000FE,000000FE), ref: 0075A763
            • FillRect.USER32(?,?,00000000), ref: 0075A795
            • GetWindowLongW.USER32(?,000000F0), ref: 0075A7C0
              • Part of subcall function 0075A8FC: GetSysColor.USER32(00000012), ref: 0075A935
              • Part of subcall function 0075A8FC: SetTextColor.GDI32(?,?), ref: 0075A939
              • Part of subcall function 0075A8FC: GetSysColorBrush.USER32(0000000F), ref: 0075A94F
              • Part of subcall function 0075A8FC: GetSysColor.USER32(0000000F), ref: 0075A95A
              • Part of subcall function 0075A8FC: GetSysColor.USER32(00000011), ref: 0075A977
              • Part of subcall function 0075A8FC: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0075A985
              • Part of subcall function 0075A8FC: SelectObject.GDI32(?,00000000), ref: 0075A996
              • Part of subcall function 0075A8FC: SetBkColor.GDI32(?,00000000), ref: 0075A99F
              • Part of subcall function 0075A8FC: SelectObject.GDI32(?,?), ref: 0075A9AC
              • Part of subcall function 0075A8FC: InflateRect.USER32(?,000000FF,000000FF), ref: 0075A9CB
              • Part of subcall function 0075A8FC: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0075A9E2
              • Part of subcall function 0075A8FC: GetWindowLongW.USER32(00000000,000000F0), ref: 0075A9F7
              • Part of subcall function 0075A8FC: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0075AA1F
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
            • String ID:
            • API String ID: 3521893082-0
            • Opcode ID: 1c1c1b456048de423fbeb17c32efffba95da360517be4acd54de7537d9f2ce3a
            • Instruction ID: e6598aa23672bad2984e3f8a34935d1d468bfe53f040c1562c45792d181f59c5
            • Opcode Fuzzy Hash: 1c1c1b456048de423fbeb17c32efffba95da360517be4acd54de7537d9f2ce3a
            • Instruction Fuzzy Hash: CC918E71408305FFD711AF64DC08A9B7BA9FF88322F148B29F962961E0D7B9D844CB56
            APIs
            • DestroyWindow.USER32(?,?,?), ref: 006D2CA2
            • DeleteObject.GDI32(00000000), ref: 006D2CE8
            • DeleteObject.GDI32(00000000), ref: 006D2CF3
            • DestroyIcon.USER32(00000000,?,?,?), ref: 006D2CFE
            • DestroyWindow.USER32(00000000,?,?,?), ref: 006D2D09
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0070C5BB
            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0070C5F4
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0070CA1D
              • Part of subcall function 006D1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006D2036,?,00000000,?,?,?,?,006D16CB,00000000,?), ref: 006D1B9A
            • SendMessageW.USER32(?,00001053), ref: 0070CA5A
            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0070CA71
            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0070CA87
            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0070CA92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
            • String ID: 0
            • API String ID: 464785882-4108050209
            • Opcode ID: f3464366af597b19b231a1289ed11c830e12f2e79a0ed78fd2d0012cd3298b23
            • Instruction ID: 461bd9e163a4e9b4262cdd6ad9c144271e4a01662ecfb608f83bc05df336068a
            • Opcode Fuzzy Hash: f3464366af597b19b231a1289ed11c830e12f2e79a0ed78fd2d0012cd3298b23
            • Instruction Fuzzy Hash: 91129E30610202EFDB62CF24C894BA9B7E6FF14311F54866AF995DB2A2C775EC42CB51
            APIs
            • DestroyWindow.USER32(00000000), ref: 007475F3
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007476B2
            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007476F0
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00747702
            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00747748
            • GetClientRect.USER32(00000000,?), ref: 00747754
            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00747798
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007477A7
            • GetStockObject.GDI32(00000011), ref: 007477B7
            • SelectObject.GDI32(00000000,00000000), ref: 007477BB
            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007477CB
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007477D4
            • DeleteDC.GDI32(00000000), ref: 007477DD
            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00747809
            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00747820
            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 0074785B
            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0074786F
            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00747880
            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 007478B0
            • GetStockObject.GDI32(00000011), ref: 007478BB
            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007478C6
            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007478D0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
            • API String ID: 2910397461-517079104
            • Opcode ID: 12cd13fd97b195d8ded21c6023f047e6ab262dce3a981bbe08ccf78ea31d5ad5
            • Instruction ID: 39f23d902ddaf95a9663ffaa291db3a45cfec3a3bc4d25291356158024385426
            • Opcode Fuzzy Hash: 12cd13fd97b195d8ded21c6023f047e6ab262dce3a981bbe08ccf78ea31d5ad5
            • Instruction Fuzzy Hash: 09A182B1A40619BFEB14DF64DC4AFAE7BB9EB04711F008115FA15A72E0D7B4AD01CB68
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0073ADAA
            • GetDriveTypeW.KERNEL32(?,0075FAC0,?,\\.\,0075F910), ref: 0073AE87
            • SetErrorMode.KERNEL32(00000000,0075FAC0,?,\\.\,0075F910), ref: 0073AFE5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
            • API String ID: 2907320926-4222207086
            • Opcode ID: d7a05d1945cc29f776cdc5fc9a2bbcca0b4742e8c30ce83b5d444b76fb2abe53
            • Instruction ID: 10a6d7b9a5611416db881b472eb96aec16ba649ef7cbaf3921ce780b8fa6d8af
            • Opcode Fuzzy Hash: d7a05d1945cc29f776cdc5fc9a2bbcca0b4742e8c30ce83b5d444b76fb2abe53
            • Instruction Fuzzy Hash: D05192F4688306BBDB54EB10C9838B9B771AB44700F64805AF886A7292DB7DDD01DB93
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-86951937
            • Opcode ID: f46c5adffdc7d20cafa1ceb9751307d67bec355f96ff7f70e494a688f0d8af94
            • Instruction ID: 5918ccb335b51e94630da3db319886e69cab628dcd0f0cf9624144c512cb961e
            • Opcode Fuzzy Hash: f46c5adffdc7d20cafa1ceb9751307d67bec355f96ff7f70e494a688f0d8af94
            • Instruction Fuzzy Hash: DB815D70A00615BACB60AF64DC43FBE77AAAF14700F04412AFD45AA3C3FBA5DE11C695
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00759B04
            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00759BBD
            • SendMessageW.USER32(?,00001102,00000002,?), ref: 00759BD9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: 0
            • API String ID: 2326795674-4108050209
            • Opcode ID: 37c56343b71584b28b3942ed8cf12d24330e67d35907bf85ed50a6e73f2aed03
            • Instruction ID: 7902e759d650ec6147e2e01332ac768570b0eda73f2cc1c326386c3bef4f318a
            • Opcode Fuzzy Hash: 37c56343b71584b28b3942ed8cf12d24330e67d35907bf85ed50a6e73f2aed03
            • Instruction Fuzzy Hash: 5702BF30104341EFEB15CF24C849BEABBE5FF49316F04862DFA95962A1D7B8D948CB91
            APIs
            • GetSysColor.USER32(00000012), ref: 0075A935
            • SetTextColor.GDI32(?,?), ref: 0075A939
            • GetSysColorBrush.USER32(0000000F), ref: 0075A94F
            • GetSysColor.USER32(0000000F), ref: 0075A95A
            • CreateSolidBrush.GDI32(?), ref: 0075A95F
            • GetSysColor.USER32(00000011), ref: 0075A977
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0075A985
            • SelectObject.GDI32(?,00000000), ref: 0075A996
            • SetBkColor.GDI32(?,00000000), ref: 0075A99F
            • SelectObject.GDI32(?,?), ref: 0075A9AC
            • InflateRect.USER32(?,000000FF,000000FF), ref: 0075A9CB
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0075A9E2
            • GetWindowLongW.USER32(00000000,000000F0), ref: 0075A9F7
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0075AA1F
            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0075AA46
            • InflateRect.USER32(?,000000FD,000000FD), ref: 0075AA64
            • DrawFocusRect.USER32(?,?), ref: 0075AA6F
            • GetSysColor.USER32(00000011), ref: 0075AA7D
            • SetTextColor.GDI32(?,00000000), ref: 0075AA85
            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0075AA99
            • SelectObject.GDI32(?,0075A62C), ref: 0075AAB0
            • DeleteObject.GDI32(?), ref: 0075AABB
            • SelectObject.GDI32(?,?), ref: 0075AAC1
            • DeleteObject.GDI32(?), ref: 0075AAC6
            • SetTextColor.GDI32(?,?), ref: 0075AACC
            • SetBkColor.GDI32(?,?), ref: 0075AAD6
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1996641542-0
            • Opcode ID: 8429282d4c52c5f2e466fd4d875f29442a9d02268ed44bf9b910195c82d92a6d
            • Instruction ID: 937e9d180675a7946d20cd8f9dc8be9dabf94d133c1bcd17ff966976c7de0ce2
            • Opcode Fuzzy Hash: 8429282d4c52c5f2e466fd4d875f29442a9d02268ed44bf9b910195c82d92a6d
            • Instruction Fuzzy Hash: 0C514D71900218FFDB119FA4DC48EEE7B79EF08322F118625F911AB2A1D7B99940CB94
            APIs
            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00758AF3
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00758B04
            • CharNextW.USER32(0000014E), ref: 00758B33
            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00758B74
            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00758B8A
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00758B9B
            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00758BB8
            • SetWindowTextW.USER32(?,0000014E), ref: 00758C0A
            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00758C20
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00758C51
            • _memset.LIBCMT ref: 00758C76
            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00758CBF
            • _memset.LIBCMT ref: 00758D1E
            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00758D48
            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00758DA0
            • SendMessageW.USER32(?,0000133D,?,?), ref: 00758E4D
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00758E6F
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00758EB9
            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00758EE6
            • DrawMenuBar.USER32(?), ref: 00758EF5
            • SetWindowTextW.USER32(?,0000014E), ref: 00758F1D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
            • String ID: 0
            • API String ID: 1073566785-4108050209
            • Opcode ID: f8220fb2329bf1c34fa6cc679e7debf39af98ab4118ad19d43987079be685e71
            • Instruction ID: 1b739541e883f423f6d397ef6d6e16300aaa7cd3e1fef140507cdd1ef9e41b64
            • Opcode Fuzzy Hash: f8220fb2329bf1c34fa6cc679e7debf39af98ab4118ad19d43987079be685e71
            • Instruction Fuzzy Hash: 8DE17070901218EBDF609F60CC84EEE7BB9EF09751F10815AFD15AA291DFB88A45CF61
            APIs
            • GetCursorPos.USER32(?), ref: 00754A33
            • GetDesktopWindow.USER32 ref: 00754A48
            • GetWindowRect.USER32(00000000), ref: 00754A4F
            • GetWindowLongW.USER32(?,000000F0), ref: 00754AB1
            • DestroyWindow.USER32(?), ref: 00754ADD
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00754B06
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00754B24
            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00754B4A
            • SendMessageW.USER32(?,00000421,?,?), ref: 00754B5F
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00754B72
            • IsWindowVisible.USER32(?), ref: 00754B92
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00754BAD
            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00754BC1
            • GetWindowRect.USER32(?,?), ref: 00754BD9
            • MonitorFromPoint.USER32(?,?,00000002), ref: 00754BFF
            • GetMonitorInfoW.USER32(00000000,?), ref: 00754C19
            • CopyRect.USER32(?,?), ref: 00754C30
            • SendMessageW.USER32(?,00000412,00000000), ref: 00754C9B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
            • String ID: ($0$tooltips_class32
            • API String ID: 698492251-4156429822
            • Opcode ID: 8b968eb1e647aeb03c8fb0461caca3d391a0e2af46b321e257a47d2bda30e1cf
            • Instruction ID: 16e923e0d7a2c8afca2e8a6aac4b4e6681eaeda02ef21c94ccf7e421f8b117dd
            • Opcode Fuzzy Hash: 8b968eb1e647aeb03c8fb0461caca3d391a0e2af46b321e257a47d2bda30e1cf
            • Instruction Fuzzy Hash: 4AB1BE71604340AFDB44DF24C889BAABBE5FF84305F00891DF9999B291D7B4EC48CBA5
            APIs
            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007344ED
            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00734513
            • _wcscpy.LIBCMT ref: 00734541
            • _wcscmp.LIBCMT ref: 0073454C
            • _wcscat.LIBCMT ref: 00734562
            • _wcsstr.LIBCMT ref: 0073456D
            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00734589
            • _wcscat.LIBCMT ref: 007345D2
            • _wcscat.LIBCMT ref: 007345D9
            • _wcsncpy.LIBCMT ref: 00734604
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
            • API String ID: 699586101-1459072770
            • Opcode ID: 19b14fad68696ab01bb22fa1318e02c564c812640b70422538cc3bf331086987
            • Instruction ID: b5418ee1ca5db87be9c9baa243e779e15954da7b4711f3a4d656b4080a9d6b37
            • Opcode Fuzzy Hash: 19b14fad68696ab01bb22fa1318e02c564c812640b70422538cc3bf331086987
            • Instruction Fuzzy Hash: 23412A72A012097BEB54BB608C03EFF376DDF45710F50406DF904E6183EB78AA1196AE
            APIs
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006D28BC
            • GetSystemMetrics.USER32(00000007), ref: 006D28C4
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006D28EF
            • GetSystemMetrics.USER32(00000008), ref: 006D28F7
            • GetSystemMetrics.USER32(00000004), ref: 006D291C
            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 006D2939
            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 006D2949
            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 006D297C
            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 006D2990
            • GetClientRect.USER32(00000000,000000FF), ref: 006D29AE
            • GetStockObject.GDI32(00000011), ref: 006D29CA
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 006D29D5
              • Part of subcall function 006D2344: GetCursorPos.USER32(?), ref: 006D2357
              • Part of subcall function 006D2344: ScreenToClient.USER32(007957B0,?), ref: 006D2374
              • Part of subcall function 006D2344: GetAsyncKeyState.USER32(00000001), ref: 006D2399
              • Part of subcall function 006D2344: GetAsyncKeyState.USER32(00000002), ref: 006D23A7
            • SetTimer.USER32(00000000,00000000,00000028,006D1256), ref: 006D29FC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
            • String ID: AutoIt v3 GUI
            • API String ID: 1458621304-248962490
            • Opcode ID: 9be039c30cc18fd81a238531aaf1a25194f3702c4a409755f185d78d8f7f469c
            • Instruction ID: 7b25bdb952071f1c42a85941983fa9574ea08592f9ff458e204e73aa5c12c7aa
            • Opcode Fuzzy Hash: 9be039c30cc18fd81a238531aaf1a25194f3702c4a409755f185d78d8f7f469c
            • Instruction Fuzzy Hash: BBB18C71A0020AEFDB15DFA8DC55BEE7BB5FB18311F10822AFA15A7390DB789841CB54
            APIs
            • GetClassNameW.USER32(?,?,00000100), ref: 0072A885
            • __swprintf.LIBCMT ref: 0072A926
            • _wcscmp.LIBCMT ref: 0072A939
            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0072A98E
            • _wcscmp.LIBCMT ref: 0072A9CA
            • GetClassNameW.USER32(?,?,00000400), ref: 0072AA01
            • GetDlgCtrlID.USER32(?), ref: 0072AA53
            • GetWindowRect.USER32(?,?), ref: 0072AA89
            • GetParent.USER32(?), ref: 0072AAA7
            • ScreenToClient.USER32(00000000), ref: 0072AAAE
            • GetClassNameW.USER32(?,?,00000100), ref: 0072AB28
            • _wcscmp.LIBCMT ref: 0072AB3C
            • GetWindowTextW.USER32(?,?,00000400), ref: 0072AB62
            • _wcscmp.LIBCMT ref: 0072AB76
              • Part of subcall function 006F37AC: _iswctype.LIBCMT ref: 006F37B4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
            • String ID: %s%u
            • API String ID: 3744389584-679674701
            • Opcode ID: 735febc7a34ce64195972ac48479419da69f156bf461332ffc74ef31d70edbb1
            • Instruction ID: dac028964ca27e5ed3cdd35813a2e1a2c416109fe87b07280c233b21eb310295
            • Opcode Fuzzy Hash: 735febc7a34ce64195972ac48479419da69f156bf461332ffc74ef31d70edbb1
            • Instruction Fuzzy Hash: 17A1E071204726FFDB15DF24D884BAAB7E9FF04354F008629F999C2151DB38E945CB92
            APIs
            • GetClassNameW.USER32(00000008,?,00000400), ref: 0072B1DA
            • _wcscmp.LIBCMT ref: 0072B1EB
            • GetWindowTextW.USER32(00000001,?,00000400), ref: 0072B213
            • CharUpperBuffW.USER32(?,00000000), ref: 0072B230
            • _wcscmp.LIBCMT ref: 0072B24E
            • _wcsstr.LIBCMT ref: 0072B25F
            • GetClassNameW.USER32(00000018,?,00000400), ref: 0072B297
            • _wcscmp.LIBCMT ref: 0072B2A7
            • GetWindowTextW.USER32(00000002,?,00000400), ref: 0072B2CE
            • GetClassNameW.USER32(00000018,?,00000400), ref: 0072B317
            • _wcscmp.LIBCMT ref: 0072B327
            • GetClassNameW.USER32(00000010,?,00000400), ref: 0072B34F
            • GetWindowRect.USER32(00000004,?), ref: 0072B3B8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
            • String ID: @$ThumbnailClass
            • API String ID: 1788623398-1539354611
            • Opcode ID: 831932837249387489765f7b78a7b83c367a66f856e199cbdb34fe952cb25486
            • Instruction ID: 4ead3bc802b5841b6c394580ffa6fd6b3a5c1a0069a256fa21736af705f2cfea
            • Opcode Fuzzy Hash: 831932837249387489765f7b78a7b83c367a66f856e199cbdb34fe952cb25486
            • Instruction Fuzzy Hash: 0781BF7100835A9FDB04DF14D885FAA7BE9FF44314F18846AFD858A1A2DB38DD49CBA1
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • DragQueryPoint.SHELL32(?,?), ref: 0075C691
              • Part of subcall function 0075AB69: ClientToScreen.USER32(?,?), ref: 0075AB92
              • Part of subcall function 0075AB69: GetWindowRect.USER32(?,?), ref: 0075AC08
              • Part of subcall function 0075AB69: PtInRect.USER32(?,?,0075C07E), ref: 0075AC18
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0075C6FA
            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0075C705
            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0075C728
            • _wcscat.LIBCMT ref: 0075C758
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0075C76F
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0075C788
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0075C79F
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0075C7C1
            • DragFinish.SHELL32(?), ref: 0075C7C8
            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0075C8BB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pby
            • API String ID: 169749273-2968689537
            • Opcode ID: d238a57e661cc90f01c62612ec412c7f7474a2d036a183bedd7a072bcc5af1cc
            • Instruction ID: 8454d222da077af8db98990526306dec8efb0e6c71b77c1b9bdcec8807a7986d
            • Opcode Fuzzy Hash: d238a57e661cc90f01c62612ec412c7f7474a2d036a183bedd7a072bcc5af1cc
            • Instruction Fuzzy Hash: D1616D71508301AFC701EF64DC85E9BBBE9EF88710F00492EF691972A1DB749A49CB96
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
            • API String ID: 1038674560-1810252412
            • Opcode ID: b4e957c581b68e5395954f467fc44a8f042a114916eaa23390f5041ad3222d9f
            • Instruction ID: 4dc9e5ab190d0899c8dc0f59d206420984886835aed74e6482c1c254cea37030
            • Opcode Fuzzy Hash: b4e957c581b68e5395954f467fc44a8f042a114916eaa23390f5041ad3222d9f
            • Instruction Fuzzy Hash: F631C470A88219A6DB28FA64DC83EAF77A69F10710F30451EB462711D2FF69AF04C656
            APIs
            • LoadIconW.USER32(00000063), ref: 0072C2D3
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0072C2E5
            • SetWindowTextW.USER32(?,?), ref: 0072C2FC
            • GetDlgItem.USER32(?,000003EA), ref: 0072C311
            • SetWindowTextW.USER32(00000000,?), ref: 0072C317
            • GetDlgItem.USER32(?,000003E9), ref: 0072C327
            • SetWindowTextW.USER32(00000000,?), ref: 0072C32D
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0072C34E
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0072C368
            • GetWindowRect.USER32(?,?), ref: 0072C371
            • SetWindowTextW.USER32(?,?), ref: 0072C3DC
            • GetDesktopWindow.USER32 ref: 0072C3E2
            • GetWindowRect.USER32(00000000), ref: 0072C3E9
            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0072C435
            • GetClientRect.USER32(?,?), ref: 0072C442
            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0072C467
            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0072C492
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: 4f9ce32d067ea73e1adcf2ecb38731e51b81093df7c48de2d81ca8224b6d0aee
            • Instruction ID: 0cda901a60c1de9ec9d91e2213ce24680e62cf8a0e7171fb08d23fb132918004
            • Opcode Fuzzy Hash: 4f9ce32d067ea73e1adcf2ecb38731e51b81093df7c48de2d81ca8224b6d0aee
            • Instruction Fuzzy Hash: F0516E31900709EFDB21DFA8DD89BAFBBF5FF04705F008928E546A25A1C7B9A944CB50
            APIs
            • LoadCursorW.USER32(00000000,00007F8A), ref: 00745129
            • LoadCursorW.USER32(00000000,00007F00), ref: 00745134
            • LoadCursorW.USER32(00000000,00007F03), ref: 0074513F
            • LoadCursorW.USER32(00000000,00007F8B), ref: 0074514A
            • LoadCursorW.USER32(00000000,00007F01), ref: 00745155
            • LoadCursorW.USER32(00000000,00007F81), ref: 00745160
            • LoadCursorW.USER32(00000000,00007F88), ref: 0074516B
            • LoadCursorW.USER32(00000000,00007F80), ref: 00745176
            • LoadCursorW.USER32(00000000,00007F86), ref: 00745181
            • LoadCursorW.USER32(00000000,00007F83), ref: 0074518C
            • LoadCursorW.USER32(00000000,00007F85), ref: 00745197
            • LoadCursorW.USER32(00000000,00007F82), ref: 007451A2
            • LoadCursorW.USER32(00000000,00007F84), ref: 007451AD
            • LoadCursorW.USER32(00000000,00007F04), ref: 007451B8
            • LoadCursorW.USER32(00000000,00007F02), ref: 007451C3
            • LoadCursorW.USER32(00000000,00007F89), ref: 007451CE
            • GetCursorInfo.USER32(?), ref: 007451DE
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Cursor$Load$Info
            • String ID:
            • API String ID: 2577412497-0
            • Opcode ID: 772bca61f4ae8025c8e9e10f01c58ca46ff9703484fadd1a4f764f398ea85c96
            • Instruction ID: 1fec07aa0a666b8dae23d4c6c21347feba2a632fcc5a9ca60b5acdeb74a72617
            • Opcode Fuzzy Hash: 772bca61f4ae8025c8e9e10f01c58ca46ff9703484fadd1a4f764f398ea85c96
            • Instruction Fuzzy Hash: CA3117B1D483196BDB109FB68C8995FBEE8FF04750F50452BE50DE7281DB7865008FA1
            APIs
            • _memset.LIBCMT ref: 0075A28B
            • DestroyWindow.USER32(?,?), ref: 0075A305
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0075A37F
            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0075A3A1
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0075A3B4
            • DestroyWindow.USER32(00000000), ref: 0075A3D6
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,006D0000,00000000), ref: 0075A40D
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0075A426
            • GetDesktopWindow.USER32 ref: 0075A43F
            • GetWindowRect.USER32(00000000), ref: 0075A446
            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0075A45E
            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0075A476
              • Part of subcall function 006D25DB: GetWindowLongW.USER32(?,000000EB), ref: 006D25EC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
            • String ID: 0$tooltips_class32
            • API String ID: 1297703922-3619404913
            • Opcode ID: 0e8fe0ebec5f07e3914344f8e5fc805b310fb54c37e23e8c6ec86e4d60731035
            • Instruction ID: af61ce871d345db592b31dd834430695c01c7ed9f0eff7d2e59f5bb2516f2c93
            • Opcode Fuzzy Hash: 0e8fe0ebec5f07e3914344f8e5fc805b310fb54c37e23e8c6ec86e4d60731035
            • Instruction Fuzzy Hash: B2719C70150344AFDB21CF68DC49FA67BE5EB88705F04462DF986872A0D7B8E906CF26
            APIs
            • CharUpperBuffW.USER32(?,?), ref: 0075448D
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007544D8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BuffCharMessageSendUpper
            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
            • API String ID: 3974292440-4258414348
            • Opcode ID: e3324e00d2f643b6ce7519c0d8a21b7c2b68d0185feaf03c53073ca84b2450d4
            • Instruction ID: 36449dfc243453c42791feb24990f693a4bb063b7bf766c61832aadc8391478e
            • Opcode Fuzzy Hash: e3324e00d2f643b6ce7519c0d8a21b7c2b68d0185feaf03c53073ca84b2450d4
            • Instruction Fuzzy Hash: 3D919F306047119FCB54EF10C491AB9B7A2EF85314F08886DFC965B3A2DB78ED4ACB95
            APIs
            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0075B8E8
            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007591F4), ref: 0075B944
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0075B97D
            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0075B9C0
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0075B9F7
            • FreeLibrary.KERNEL32(?), ref: 0075BA03
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0075BA13
            • DestroyIcon.USER32(?,?,?,?,?,007591F4), ref: 0075BA22
            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0075BA3F
            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0075BA4B
              • Part of subcall function 006F307D: __wcsicmp_l.LIBCMT ref: 006F3106
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
            • String ID: .dll$.exe$.icl
            • API String ID: 1212759294-1154884017
            • Opcode ID: 5cfee202a7b4f65a0882aa993abf5d3b517a32098b9681fb0d807eeb12924903
            • Instruction ID: bb8e62049baa5ae19289c5303231884602d220f448b732226a294d6806cb4f7c
            • Opcode Fuzzy Hash: 5cfee202a7b4f65a0882aa993abf5d3b517a32098b9681fb0d807eeb12924903
            • Instruction Fuzzy Hash: F561BEB1940619BEEB14DF64CC45BFE77A8EF08712F10851AFD15D61D0DBB8A988CBA0
            APIs
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • CharLowerBuffW.USER32(?,?), ref: 0073A455
            • GetDriveTypeW.KERNEL32 ref: 0073A4A2
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0073A4EA
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0073A521
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0073A54F
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 2698844021-4113822522
            • Opcode ID: eddf8014a89a95c267aef56ecf7ecf892f52cd138ce94336f864a97f51fc8e3f
            • Instruction ID: 5ecdae80fcf967c8ede843b0f125a8aecf990e22e0688108a1cb7243b84c219e
            • Opcode Fuzzy Hash: eddf8014a89a95c267aef56ecf7ecf892f52cd138ce94336f864a97f51fc8e3f
            • Instruction Fuzzy Hash: B7518B71504304AFC750EF20C89196AB7E5FF88718F04896EF88A573A2DB35EE09CB56
            APIs
            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00759239,?,?), ref: 0075BA8A
            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00759239,?,?,00000000,?), ref: 0075BAA1
            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00759239,?,?,00000000,?), ref: 0075BAAC
            • CloseHandle.KERNEL32(00000000,?,?,?,?,00759239,?,?,00000000,?), ref: 0075BAB9
            • GlobalLock.KERNEL32(00000000), ref: 0075BAC2
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00759239,?,?,00000000,?), ref: 0075BAD1
            • GlobalUnlock.KERNEL32(00000000), ref: 0075BADA
            • CloseHandle.KERNEL32(00000000,?,?,?,?,00759239,?,?,00000000,?), ref: 0075BAE1
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00759239,?,?,00000000,?), ref: 0075BAF2
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00762CAC,?), ref: 0075BB0B
            • GlobalFree.KERNEL32(00000000), ref: 0075BB1B
            • GetObjectW.GDI32(00000000,00000018,?), ref: 0075BB3F
            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0075BB6A
            • DeleteObject.GDI32(00000000), ref: 0075BB92
            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0075BBA8
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3840717409-0
            • Opcode ID: 55a4fd906a01f6a1f6f5065c8ec7c79ab048c89bf86479c1d9c4977ae1305da5
            • Instruction ID: 247e17c93d3410620ae4a7d5809b0e83d5a0a0aea087ca82c081c5a68a2a702e
            • Opcode Fuzzy Hash: 55a4fd906a01f6a1f6f5065c8ec7c79ab048c89bf86479c1d9c4977ae1305da5
            • Instruction Fuzzy Hash: 0C410675600209AFDB119F65DC88EEA7BB8FB89712F108068F909D7260D7B89905DB64
            APIs
            • __wsplitpath.LIBCMT ref: 0073DA9C
            • _wcscat.LIBCMT ref: 0073DAB4
            • _wcscat.LIBCMT ref: 0073DAC6
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0073DADB
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0073DAEF
            • GetFileAttributesW.KERNEL32(?), ref: 0073DB07
            • SetFileAttributesW.KERNEL32(?,00000000), ref: 0073DB21
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0073DB33
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
            • String ID: *.*
            • API String ID: 34673085-438819550
            • Opcode ID: e6e4d650f9609c50bc4185b1d001cac9f6ce749f2d45922986b4b013ffc40278
            • Instruction ID: 4a3864b9e8671b64e301243fc3b2cbf74f8860c99e881d0cfcb060fc1e9725ec
            • Opcode Fuzzy Hash: e6e4d650f9609c50bc4185b1d001cac9f6ce749f2d45922986b4b013ffc40278
            • Instruction Fuzzy Hash: C481A2B29083449FDB74DF64D94496AB7E9FB88310F18882EF485D7252E738ED44CB52
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0075C266
            • GetFocus.USER32 ref: 0075C276
            • GetDlgCtrlID.USER32(00000000), ref: 0075C281
            • _memset.LIBCMT ref: 0075C3AC
            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0075C3D7
            • GetMenuItemCount.USER32(?), ref: 0075C3F7
            • GetMenuItemID.USER32(?,00000000), ref: 0075C40A
            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0075C43E
            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0075C486
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0075C4BE
            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0075C4F3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
            • String ID: 0
            • API String ID: 1296962147-4108050209
            • Opcode ID: c8048d1492c571367435a2c16feb6edc555b5ad2fa5546625f301a2746fa99f8
            • Instruction ID: 9185f248b5aaab82a015c954268f2156e7f5b52428133b54c45395a6f4f3b7c5
            • Opcode Fuzzy Hash: c8048d1492c571367435a2c16feb6edc555b5ad2fa5546625f301a2746fa99f8
            • Instruction Fuzzy Hash: 0D819C71208341AFD712CF14C894EBABBE8FB88315F00452EFD9597291D7B8D909CBA2
            APIs
            • GetDC.USER32(00000000), ref: 007474A4
            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 007474B0
            • CreateCompatibleDC.GDI32(?), ref: 007474BC
            • SelectObject.GDI32(00000000,?), ref: 007474C9
            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0074751D
            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00747559
            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0074757D
            • SelectObject.GDI32(00000006,?), ref: 00747585
            • DeleteObject.GDI32(?), ref: 0074758E
            • DeleteDC.GDI32(00000006), ref: 00747595
            • ReleaseDC.USER32(00000000,?), ref: 007475A0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
            • String ID: (
            • API String ID: 2598888154-3887548279
            • Opcode ID: f8adb77839858882c4044a9254c6c9abd69836a4126528704d5fc2a803af0a6c
            • Instruction ID: 26e2a93882ed177c8992a6073dfb9ef78fa4f7b13196f42132ccfd26e4e76247
            • Opcode Fuzzy Hash: f8adb77839858882c4044a9254c6c9abd69836a4126528704d5fc2a803af0a6c
            • Instruction Fuzzy Hash: 51514971904309EFCB15CFA8CC85EAEBBB9EF48310F14842DFA4997251D775A940CB64
            APIs
              • Part of subcall function 006F0AD7: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,006D6C6C,?,00008000), ref: 006F0AF3
              • Part of subcall function 006D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006D48A1,?,?,006D37C0,?), ref: 006D48CE
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 006D6D0D
            • SetCurrentDirectoryW.KERNEL32(?), ref: 006D6E5A
              • Part of subcall function 006D59CD: _wcscpy.LIBCMT ref: 006D5A05
              • Part of subcall function 006F37BD: _iswctype.LIBCMT ref: 006F37C5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
            • API String ID: 537147316-1018226102
            • Opcode ID: 8b9302ce3961f9e3593d5e1f01dcb5e9adc4ea47bd7b30fae98d1b1c9cc7257b
            • Instruction ID: 6ca605ab1e3dbf7e630cb490ccba7cd6566fc1a92f2849648c940e3a0c131bec
            • Opcode Fuzzy Hash: 8b9302ce3961f9e3593d5e1f01dcb5e9adc4ea47bd7b30fae98d1b1c9cc7257b
            • Instruction Fuzzy Hash: BC029E71908341DFC764EF24C881AAFBBE6AF98314F04491EF486972A1DB34E949CB56
            APIs
            • _memset.LIBCMT ref: 006D45F9
            • GetMenuItemCount.USER32(00795890), ref: 0070D6FD
            • GetMenuItemCount.USER32(00795890), ref: 0070D7AD
            • GetCursorPos.USER32(?), ref: 0070D7F1
            • SetForegroundWindow.USER32(00000000), ref: 0070D7FA
            • TrackPopupMenuEx.USER32(00795890,00000000,?,00000000,00000000,00000000), ref: 0070D80D
            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0070D819
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
            • String ID:
            • API String ID: 2751501086-0
            • Opcode ID: 38ff111951bd2e7f68e05650c233dee044ed0eb190a71f1b2ad3598c12a8f0df
            • Instruction ID: fd20fc1e869d0f54d5bb68706a6a2005aaa2d8c9c1e71a6f183b4161fc7aedde
            • Opcode Fuzzy Hash: 38ff111951bd2e7f68e05650c233dee044ed0eb190a71f1b2ad3598c12a8f0df
            • Instruction Fuzzy Hash: 1271E330600345FBEB309F94DC89FAABFA5FB05364F104216F519A62D1DBB9AC60CB54
            APIs
            • VariantInit.OLEAUT32(?), ref: 007489EC
            • CoInitialize.OLE32(00000000), ref: 00748A19
            • CoUninitialize.OLE32 ref: 00748A23
            • GetRunningObjectTable.OLE32(00000000,?), ref: 00748B23
            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00748C50
            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00762C0C), ref: 00748C84
            • CoGetObject.OLE32(?,00000000,00762C0C,?), ref: 00748CA7
            • SetErrorMode.KERNEL32(00000000), ref: 00748CBA
            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00748D3A
            • VariantClear.OLEAUT32(?), ref: 00748D4A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
            • String ID: ,,v
            • API String ID: 2395222682-1312938289
            • Opcode ID: 9b6f38fa7aeb6f2855e95492dbe8975c76401e1f9f3b472a4c9e97ae84705553
            • Instruction ID: 4d2a0f369af854daa8d93428d0432e217152b1f3554915ead9c6753799809c8a
            • Opcode Fuzzy Hash: 9b6f38fa7aeb6f2855e95492dbe8975c76401e1f9f3b472a4c9e97ae84705553
            • Instruction Fuzzy Hash: 5DC147B1608309AFC740DF24C88496BB7E9FF89348F00495DF98A9B251DB75ED05CB62
            APIs
            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0074FE38,?,?), ref: 00750EBC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
            • API String ID: 3964851224-909552448
            • Opcode ID: 0f05223fc2cf017dac4d59586dab06d23972fcc19981a2e218c3e3cb120c7332
            • Instruction ID: 45710fbb5450a42d3a333ddd00b50336dd57a5f3292fb24400089d25d49921c0
            • Opcode Fuzzy Hash: 0f05223fc2cf017dac4d59586dab06d23972fcc19981a2e218c3e3cb120c7332
            • Instruction Fuzzy Hash: 49417F3054028A8BDF60EF10DD91AFE3721EF12302F584429FD595B292EB799D5ECBA4
            APIs
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
              • Part of subcall function 006D7A84: _memmove.LIBCMT ref: 006D7B0D
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007353D7
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007353ED
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007353FE
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00735410
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00735421
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: SendString$_memmove
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 2279737902-1007645807
            • Opcode ID: 4615dcaa18c1e05f9ce31f6a11b2027739efd5a8d6bec697c2532983b395d5b6
            • Instruction ID: be6c547a65912af7424f28aa764d08f25cf0cc2c876786088c333b07305eb324
            • Opcode Fuzzy Hash: 4615dcaa18c1e05f9ce31f6a11b2027739efd5a8d6bec697c2532983b395d5b6
            • Instruction Fuzzy Hash: 9C11C461AD016979E7A4F7A1CC4ADFF7B7CEF95B40F40042AB401A21D2FEA40D44C6A2
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 208665112-3771769585
            • Opcode ID: 1fc5610840fdbca951224fc5c089ce711dc417992fff9b954ac7c3760aef1349
            • Instruction ID: 0f6cf6793e8c6afa481f1e77bf120ed59faac544bce221625194320a7b825af1
            • Opcode Fuzzy Hash: 1fc5610840fdbca951224fc5c089ce711dc417992fff9b954ac7c3760aef1349
            • Instruction Fuzzy Hash: E8110A31504218AFEB24A720DC4AEEA77FDDF12721F0441B9F50596192EFB8AE818B95
            APIs
            • timeGetTime.WINMM ref: 00735021
              • Part of subcall function 006F034A: timeGetTime.WINMM(?,76C1B400,006E0FDB), ref: 006F034E
            • Sleep.KERNEL32(0000000A), ref: 0073504D
            • EnumThreadWindows.USER32(?,Function_00064FCF,00000000), ref: 00735071
            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00735093
            • SetActiveWindow.USER32 ref: 007350B2
            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007350C0
            • SendMessageW.USER32(00000010,00000000,00000000), ref: 007350DF
            • Sleep.KERNEL32(000000FA), ref: 007350EA
            • IsWindow.USER32 ref: 007350F6
            • EndDialog.USER32(00000000), ref: 00735107
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
            • String ID: BUTTON
            • API String ID: 1194449130-3405671355
            • Opcode ID: 185e82323e86f72d7d6017512eab29e82cdbabafb487683da64a111c6d2548ef
            • Instruction ID: 332e6ac6a807ba81ee098dcd450e17f765109961db5ebadfb34ace5f7fc279af
            • Opcode Fuzzy Hash: 185e82323e86f72d7d6017512eab29e82cdbabafb487683da64a111c6d2548ef
            • Instruction Fuzzy Hash: 6E2199B0201708FFF7119F70EC89F663769E749346F169125F50182172DB6D8D61876A
            APIs
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • CoInitialize.OLE32(00000000), ref: 0073D676
            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0073D709
            • SHGetDesktopFolder.SHELL32(?), ref: 0073D71D
            • CoCreateInstance.OLE32(00762D7C,00000000,00000001,00788C1C,?), ref: 0073D769
            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0073D7D8
            • CoTaskMemFree.OLE32(?,?), ref: 0073D830
            • _memset.LIBCMT ref: 0073D86D
            • SHBrowseForFolderW.SHELL32(?), ref: 0073D8A9
            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0073D8CC
            • CoTaskMemFree.OLE32(00000000), ref: 0073D8D3
            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0073D90A
            • CoUninitialize.OLE32(00000001,00000000), ref: 0073D90C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
            • String ID:
            • API String ID: 1246142700-0
            • Opcode ID: c0e198c7742c00e52e467eea0fe2766c0c04d237e78afee11cbfc829dd86ab17
            • Instruction ID: cc3a4b18f78d402b15b27bc7340a0660a37f457a290e38a36ecc28c1a0d62eeb
            • Opcode Fuzzy Hash: c0e198c7742c00e52e467eea0fe2766c0c04d237e78afee11cbfc829dd86ab17
            • Instruction Fuzzy Hash: B6B1FA75A00209AFDB14DFA4D889DAEBBB9FF48314F148069F809EB251DB34ED45CB54
            APIs
            • GetKeyboardState.USER32(?), ref: 007303C8
            • SetKeyboardState.USER32(?), ref: 00730433
            • GetAsyncKeyState.USER32(000000A0), ref: 00730453
            • GetKeyState.USER32(000000A0), ref: 0073046A
            • GetAsyncKeyState.USER32(000000A1), ref: 00730499
            • GetKeyState.USER32(000000A1), ref: 007304AA
            • GetAsyncKeyState.USER32(00000011), ref: 007304D6
            • GetKeyState.USER32(00000011), ref: 007304E4
            • GetAsyncKeyState.USER32(00000012), ref: 0073050D
            • GetKeyState.USER32(00000012), ref: 0073051B
            • GetAsyncKeyState.USER32(0000005B), ref: 00730544
            • GetKeyState.USER32(0000005B), ref: 00730552
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: 6f0842543dd5618ad76065b7c7136d18dcd6d96658d4b067b01f3cfa39970530
            • Instruction ID: fd50f9e83713969fa84826790c51d3be7b23c10ad1f9e612dbcd3505a3d80d2c
            • Opcode Fuzzy Hash: 6f0842543dd5618ad76065b7c7136d18dcd6d96658d4b067b01f3cfa39970530
            • Instruction Fuzzy Hash: E051B9209087946AFB35DBB08425BEEBFB49F02380F48859DD5C2565C3DA6C9B4CCBE1
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 0072C545
            • GetWindowRect.USER32(00000000,?), ref: 0072C557
            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0072C5B5
            • GetDlgItem.USER32(?,00000002), ref: 0072C5C0
            • GetWindowRect.USER32(00000000,?), ref: 0072C5D2
            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0072C626
            • GetDlgItem.USER32(?,000003E9), ref: 0072C634
            • GetWindowRect.USER32(00000000,?), ref: 0072C645
            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0072C688
            • GetDlgItem.USER32(?,000003EA), ref: 0072C696
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0072C6B3
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0072C6C0
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: 02cccf1199c6c5c00f7f3b78be78775a7962c305bc0c1bdcb40dddc977c0111f
            • Instruction ID: f314b1399a98afc9e611495f078c48982ba69a83afd629905929d1542b391481
            • Opcode Fuzzy Hash: 02cccf1199c6c5c00f7f3b78be78775a7962c305bc0c1bdcb40dddc977c0111f
            • Instruction Fuzzy Hash: 5D514071B00305AFDB18CFA9DD89AAEBBBAEB98311F14812DF515D7290D7B4ED008B54
            APIs
              • Part of subcall function 006D1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006D2036,?,00000000,?,?,?,?,006D16CB,00000000,?), ref: 006D1B9A
            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006D20D3
            • KillTimer.USER32(-00000001,?,?,?,?,006D16CB,00000000,?,?,006D1AE2,?,?), ref: 006D216E
            • DestroyAcceleratorTable.USER32(00000000), ref: 0070BE26
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006D16CB,00000000,?,?,006D1AE2,?,?), ref: 0070BE57
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006D16CB,00000000,?,?,006D1AE2,?,?), ref: 0070BE6E
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006D16CB,00000000,?,?,006D1AE2,?,?), ref: 0070BE8A
            • DeleteObject.GDI32(00000000), ref: 0070BE9C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
            • String ID:
            • API String ID: 641708696-0
            • Opcode ID: 0b6c4361d0bba6192f19f0b8eeda22879457d553bba60527eee8cdb80256895e
            • Instruction ID: 6049f86daf86c88b1752f57827d62ef1f518dc06b33172b3b5794bf5998e7156
            • Opcode Fuzzy Hash: 0b6c4361d0bba6192f19f0b8eeda22879457d553bba60527eee8cdb80256895e
            • Instruction Fuzzy Hash: 5E619F30900B12DFDB26DF14DD58B6AB7F2FF54312F50C52AE642476A0C378A992DB54
            APIs
              • Part of subcall function 006D25DB: GetWindowLongW.USER32(?,000000EB), ref: 006D25EC
            • GetSysColor.USER32(0000000F), ref: 006D21D3
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ColorLongWindow
            • String ID:
            • API String ID: 259745315-0
            • Opcode ID: 504cf492eb1e9d496b3dcc0230ca60c20893783eede4c5d214ea1f46ccb2c57f
            • Instruction ID: e0e2860b49ec76c7f1ce7faecf8d51d3b422c5d5b7235634eeb23524ed064057
            • Opcode Fuzzy Hash: 504cf492eb1e9d496b3dcc0230ca60c20893783eede4c5d214ea1f46ccb2c57f
            • Instruction Fuzzy Hash: F041D331504605DBDB215F28EC98BF93BA6EB16331F148366FD618A2E1C7758E42DB21
            APIs
            • CharLowerBuffW.USER32(?,?,0075F910), ref: 0073A995
            • GetDriveTypeW.KERNEL32(00000061,007889A0,00000061), ref: 0073AA5F
            • _wcscpy.LIBCMT ref: 0073AA89
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy
            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
            • API String ID: 2820617543-1000479233
            • Opcode ID: d22a6e1ac1104d1225457b47301da8be61a7c143d709dc5e144b802e49173f31
            • Instruction ID: 804e90bcc04d76de532ada4c35badd6a3e5902016705966dcce89500fc752bc3
            • Opcode Fuzzy Hash: d22a6e1ac1104d1225457b47301da8be61a7c143d709dc5e144b802e49173f31
            • Instruction Fuzzy Hash: 8951DD31508301AFD350EF14C9D2AAEB7A6EF85300F54892EF596972A3DB35AD09CB53
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __i64tow__itow__swprintf
            • String ID: %.15g$0x%p$False$True
            • API String ID: 421087845-2263619337
            • Opcode ID: d658ae9bd6a85f85d9a7dc68bb28e162d6fdb54d6c6f00046870905c1cd2901e
            • Instruction ID: cffac17f4da80d95d8d387299163a06637fa59372c1b7000ff5d22ab6fbb0662
            • Opcode Fuzzy Hash: d658ae9bd6a85f85d9a7dc68bb28e162d6fdb54d6c6f00046870905c1cd2901e
            • Instruction Fuzzy Hash: 5B41E671914209EEEB74AF34C842E7673E6EB44300F24856EE549DB3D2EA35AD428B21
            APIs
            • _memset.LIBCMT ref: 0075719C
            • CreateMenu.USER32 ref: 007571B7
            • SetMenu.USER32(?,00000000), ref: 007571C6
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00757253
            • IsMenu.USER32(?), ref: 00757269
            • CreatePopupMenu.USER32 ref: 00757273
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007572A0
            • DrawMenuBar.USER32 ref: 007572A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
            • String ID: 0$F
            • API String ID: 176399719-3044882817
            • Opcode ID: 2a32f9841087a734ddff7663f18ebee58d5b9c7b107dbac11da199f5579833d3
            • Instruction ID: c2ceefdd4ae95d6932079981a40357d81db2d9137f96076f5881820ca7a3cee7
            • Opcode Fuzzy Hash: 2a32f9841087a734ddff7663f18ebee58d5b9c7b107dbac11da199f5579833d3
            • Instruction Fuzzy Hash: B0413574A01209EFDB14DF64E884ADA7BB5FF49342F144129FD09A7360D7B8AD24CBA4
            APIs
            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00757590
            • CreateCompatibleDC.GDI32(00000000), ref: 00757597
            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007575AA
            • SelectObject.GDI32(00000000,00000000), ref: 007575B2
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 007575BD
            • DeleteDC.GDI32(00000000), ref: 007575C6
            • GetWindowLongW.USER32(?,000000EC), ref: 007575D0
            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007575E4
            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007575F0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
            • String ID: static
            • API String ID: 2559357485-2160076837
            • Opcode ID: 5fd8f6d5ccc18935ca42fce130cdcf93e14228a94828ec9d7b301adfdfb1e5c8
            • Instruction ID: 0a96af0bbca31fa094d1f26f575ff39c5df3aa4fbd5c5687d6009292bd702547
            • Opcode Fuzzy Hash: 5fd8f6d5ccc18935ca42fce130cdcf93e14228a94828ec9d7b301adfdfb1e5c8
            • Instruction Fuzzy Hash: 7D31A171104218BBDF169F64DC08FDB3B69FF09322F104224FA15961A0D7B9D825DB64
            APIs
            • _memset.LIBCMT ref: 006F6FBB
              • Part of subcall function 006F8CA8: __getptd_noexit.LIBCMT ref: 006F8CA8
            • __gmtime64_s.LIBCMT ref: 006F7054
            • __gmtime64_s.LIBCMT ref: 006F708A
            • __gmtime64_s.LIBCMT ref: 006F70A7
            • __allrem.LIBCMT ref: 006F70FD
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006F7119
            • __allrem.LIBCMT ref: 006F7130
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006F714E
            • __allrem.LIBCMT ref: 006F7165
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006F7183
            • __invoke_watson.LIBCMT ref: 006F71F4
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
            • String ID:
            • API String ID: 384356119-0
            • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
            • Instruction ID: 83e762a5c010c62e538b2f98e011d2c393727b4558de53f8e6d38504aceebd41
            • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
            • Instruction Fuzzy Hash: C171F6B1A0171AEBE714DE68CC41BBAB3AAAF11324F144229F614D73C1EB74E9448790
            APIs
            • _memset.LIBCMT ref: 0073283A
            • GetMenuItemInfoW.USER32(00795890,000000FF,00000000,00000030), ref: 0073289B
            • SetMenuItemInfoW.USER32(00795890,00000004,00000000,00000030), ref: 007328D1
            • Sleep.KERNEL32(000001F4), ref: 007328E3
            • GetMenuItemCount.USER32(?), ref: 00732927
            • GetMenuItemID.USER32(?,00000000), ref: 00732943
            • GetMenuItemID.USER32(?,-00000001), ref: 0073296D
            • GetMenuItemID.USER32(?,?), ref: 007329B2
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007329F8
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00732A0C
            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00732A2D
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
            • String ID:
            • API String ID: 4176008265-0
            • Opcode ID: 2e14bffa10256b4a91f84101734333d269b97779ca14853355d78a6c3f75a2b1
            • Instruction ID: 0ca90a9d25bee76a923dc201c32473c6108b3048882797061152329e61502592
            • Opcode Fuzzy Hash: 2e14bffa10256b4a91f84101734333d269b97779ca14853355d78a6c3f75a2b1
            • Instruction Fuzzy Hash: 1661A0B0900259AFEB21CF64CC88AFE7BB9FB05304F148059E842A7253D779AD07DB61
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00756FD7
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00756FDA
            • GetWindowLongW.USER32(?,000000F0), ref: 00756FFE
            • _memset.LIBCMT ref: 0075700F
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00757021
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00757099
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$LongWindow_memset
            • String ID:
            • API String ID: 830647256-0
            • Opcode ID: 98c8faebac4647a02c24e38fea531383ae128cc5fea2fc1887570ab35d504118
            • Instruction ID: 4350c6d29f227c7594eae1d7ee4ec41c750b1c741e3ea4f69b71ad436aab45b9
            • Opcode Fuzzy Hash: 98c8faebac4647a02c24e38fea531383ae128cc5fea2fc1887570ab35d504118
            • Instruction Fuzzy Hash: 37619F71900218EFDB11DFA4DC81EEE77F8EB09710F10415AFA14AB2A1C7B8AD45DB64
            APIs
            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00726F15
            • SafeArrayAllocData.OLEAUT32(?), ref: 00726F6E
            • VariantInit.OLEAUT32(?), ref: 00726F80
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00726FA0
            • VariantCopy.OLEAUT32(?,?), ref: 00726FF3
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00727007
            • VariantClear.OLEAUT32(?), ref: 0072701C
            • SafeArrayDestroyData.OLEAUT32(?), ref: 00727029
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00727032
            • VariantClear.OLEAUT32(?), ref: 00727044
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0072704F
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
            • String ID:
            • API String ID: 2706829360-0
            • Opcode ID: 0e6a17b4f2d8bf7bda0f8a8673bd41b86012bacec534dcd58c6ba5d03bc40f93
            • Instruction ID: f4fadf14a80729c0f1d568359a5c07e45878bb2297fa027c4743fc0e7d287395
            • Opcode Fuzzy Hash: 0e6a17b4f2d8bf7bda0f8a8673bd41b86012bacec534dcd58c6ba5d03bc40f93
            • Instruction Fuzzy Hash: C2417131900229DFCF14EF64E848DEEBBB9FF08311F008069E915A7261CB79A945CFA4
            APIs
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • CoInitialize.OLE32 ref: 00748518
            • CoUninitialize.OLE32 ref: 00748523
            • CoCreateInstance.OLE32(?,00000000,00000017,00762BEC,?), ref: 00748583
            • IIDFromString.OLE32(?,?), ref: 007485F6
            • VariantInit.OLEAUT32(?), ref: 00748690
            • VariantClear.OLEAUT32(?), ref: 007486F1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
            • API String ID: 834269672-1287834457
            • Opcode ID: 8d5c6ef11ea0aa07001fdd26a0093b96418a719945b3c3ac170613b916b2f747
            • Instruction ID: dc81a983afb2e909aa9eb94ac58223d4112b076e3a8542f46a3d0194440bf550
            • Opcode Fuzzy Hash: 8d5c6ef11ea0aa07001fdd26a0093b96418a719945b3c3ac170613b916b2f747
            • Instruction Fuzzy Hash: 6061BD70608305AFD790DF24C848B6EBBE4AF48714F05491DF9859B292CB78ED48CB97
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 007458A9
            • inet_addr.WSOCK32(?,?,?), ref: 007458EE
            • gethostbyname.WSOCK32(?), ref: 007458FA
            • IcmpCreateFile.IPHLPAPI ref: 00745908
            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00745978
            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0074598E
            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00745A03
            • WSACleanup.WSOCK32 ref: 00745A09
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
            • String ID: Ping
            • API String ID: 1028309954-2246546115
            • Opcode ID: 096bc46b6445f3b33242d6966f54a42c9ee959b51c5b070d094d1f9b95871c08
            • Instruction ID: 75820247c54a095444bbcaecf1c63367d8d1c47845f4fa341766537d73ccaacd
            • Opcode Fuzzy Hash: 096bc46b6445f3b33242d6966f54a42c9ee959b51c5b070d094d1f9b95871c08
            • Instruction Fuzzy Hash: FB517131604700EFD711AF24CC49B6A77E5EF48720F14892AF956DB2A2DB74EC04DB55
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0073B55C
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0073B5D2
            • GetLastError.KERNEL32 ref: 0073B5DC
            • SetErrorMode.KERNEL32(00000000,READY), ref: 0073B649
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: e5fe9917bbdfae263a726b117118a97bc1078a0db25b6aef638a19dea9fa158f
            • Instruction ID: c383caacd017b248cec440d0400e2b4d87079005a42b9aa3fc921d118805d4d4
            • Opcode Fuzzy Hash: e5fe9917bbdfae263a726b117118a97bc1078a0db25b6aef638a19dea9fa158f
            • Instruction Fuzzy Hash: 8C318175A44209DFEB10EFA4D886AFE7BB4EF44310F14406AF6019B293DB799901CB95
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 0072AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0072AEC7
            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007292D6
            • GetDlgCtrlID.USER32 ref: 007292E1
            • GetParent.USER32 ref: 007292FD
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00729300
            • GetDlgCtrlID.USER32(?), ref: 00729309
            • GetParent.USER32(?), ref: 00729325
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00729328
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent$ClassName_memmove
            • String ID: ComboBox$ListBox
            • API String ID: 1536045017-1403004172
            • Opcode ID: 475a0652c788d5029b24e89d864296cda26f2031c7ef8483257c7eab9a7eaeae
            • Instruction ID: 7de272c07e3a0e3d176be4d00f2493ea5df0a2f62c97ab1234080511c7e5215d
            • Opcode Fuzzy Hash: 475a0652c788d5029b24e89d864296cda26f2031c7ef8483257c7eab9a7eaeae
            • Instruction Fuzzy Hash: 9C21F170E40214BBDF04AB64CC89EFEBBA5EF49310F14411AF922972E2DB7D5815DB24
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 0072AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0072AEC7
            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007293BF
            • GetDlgCtrlID.USER32 ref: 007293CA
            • GetParent.USER32 ref: 007293E6
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 007293E9
            • GetDlgCtrlID.USER32(?), ref: 007293F2
            • GetParent.USER32(?), ref: 0072940E
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00729411
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent$ClassName_memmove
            • String ID: ComboBox$ListBox
            • API String ID: 1536045017-1403004172
            • Opcode ID: e6193e6189aa5e47b0716c1d264924d7349451cfccac7b209d6174d7738129d5
            • Instruction ID: c0b3e099002f6f2c088051a9ea1ce6472b7a8401bc44df8e466e0fb635ce3cd5
            • Opcode Fuzzy Hash: e6193e6189aa5e47b0716c1d264924d7349451cfccac7b209d6174d7738129d5
            • Instruction Fuzzy Hash: 0F21C874D00214BBDF04AB64DC85EFEBBB5EF49300F14405AF911972A2DB7D9916DB24
            APIs
            • GetParent.USER32 ref: 00729431
            • GetClassNameW.USER32(00000000,?,00000100), ref: 00729446
            • _wcscmp.LIBCMT ref: 00729458
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007294D3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClassMessageNameParentSend_wcscmp
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 1704125052-3381328864
            • Opcode ID: 2edbdc80a4f6db200d71b5dd3f5411cdca62122c660f644c36d39da91a21ea5e
            • Instruction ID: cfc378abd0382e8aca4407157ccec8bc30bdda88c00dc4826c56237d39785fa7
            • Opcode Fuzzy Hash: 2edbdc80a4f6db200d71b5dd3f5411cdca62122c660f644c36d39da91a21ea5e
            • Instruction Fuzzy Hash: DB110A76288366B9F6143620BC07DA7739CDF05320F20412BFB05E40E1FE99A8528658
            APIs
            • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00737B15
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ArraySafeVartype
            • String ID:
            • API String ID: 1725837607-0
            • Opcode ID: 18ed57adfaf72005c46a7fcdd6b62aabff561932343b8c8ff160da97f1479245
            • Instruction ID: 39c130a9d273c616661597d64d322dd48810b2e8c0ede30e23775db33d719b85
            • Opcode Fuzzy Hash: 18ed57adfaf72005c46a7fcdd6b62aabff561932343b8c8ff160da97f1479245
            • Instruction Fuzzy Hash: DDB192B1A1421A9FEB24DF94C885BBEB7B5FF08321F244469E500EB252D738D941DBA1
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00731521
            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00730599,?,00000001), ref: 00731535
            • GetWindowThreadProcessId.USER32(00000000), ref: 0073153C
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00730599,?,00000001), ref: 0073154B
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0073155D
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00730599,?,00000001), ref: 00731576
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00730599,?,00000001), ref: 00731588
            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00730599,?,00000001), ref: 007315CD
            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00730599,?,00000001), ref: 007315E2
            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00730599,?,00000001), ref: 007315ED
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: f17b71df0218d619a077aac27e4fb1d7d575ab2d60298a1ed955ddff432d5d5f
            • Instruction ID: 97f4365353e5b570cc8e7a4e5ad7fe5b6612835d2b097b3f5a35ab2d89e068b1
            • Opcode Fuzzy Hash: f17b71df0218d619a077aac27e4fb1d7d575ab2d60298a1ed955ddff432d5d5f
            • Instruction Fuzzy Hash: C4318D71900304BFEB10AF64EC48BB977BAEB94352F50C126F906C61A1DBBC9D518B68
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Variant$ClearInit$_memset
            • String ID: ,,v$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
            • API String ID: 2862541840-3574538243
            • Opcode ID: 46cad8904ba07bc1b857b4f51a9d0f0a3e19309ef2f95d4112cd34e63a171dcf
            • Instruction ID: 80b6c17f7a5395d8352cbb3afcdc4ba99625c3508ffd67332de479905f520593
            • Opcode Fuzzy Hash: 46cad8904ba07bc1b857b4f51a9d0f0a3e19309ef2f95d4112cd34e63a171dcf
            • Instruction Fuzzy Hash: 2E917D71A00219AFDF24DFA5C848FAFBBB8EF45710F108559F615AB280D7789946CFA0
            APIs
            • EnumChildWindows.USER32(?,0072A844), ref: 0072A782
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ChildEnumWindows
            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
            • API String ID: 3555792229-1603158881
            • Opcode ID: 36e5a5da7e0f1af24edc82c13789d6a84409ff85f939981c531fdbc0e76a12d4
            • Instruction ID: cf532feb78f31829305784a41d9d2239864929b4dbad59dc9834226ad401c7a9
            • Opcode Fuzzy Hash: 36e5a5da7e0f1af24edc82c13789d6a84409ff85f939981c531fdbc0e76a12d4
            • Instruction Fuzzy Hash: 9691C170A0061AFBDB48EF60D481BE9FB76BF04304F148129E95AA7241DF34A999CB95
            APIs
            • SetWindowLongW.USER32(?,000000EB), ref: 006D2EAE
              • Part of subcall function 006D1DB3: GetClientRect.USER32(?,?), ref: 006D1DDC
              • Part of subcall function 006D1DB3: GetWindowRect.USER32(?,?), ref: 006D1E1D
              • Part of subcall function 006D1DB3: ScreenToClient.USER32(?,?), ref: 006D1E45
            • GetDC.USER32 ref: 0070CEB2
            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0070CEC5
            • SelectObject.GDI32(00000000,00000000), ref: 0070CED3
            • SelectObject.GDI32(00000000,00000000), ref: 0070CEE8
            • ReleaseDC.USER32(?,00000000), ref: 0070CEF0
            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0070CF7B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
            • String ID: U
            • API String ID: 4009187628-3372436214
            • Opcode ID: a6f4a117456a64615db5b8149c1d3ddbac1c46967b9aa1b07a2a104750b3b100
            • Instruction ID: 9b7c60edd1f3b6f2aa32a0710e7ce5bb4561dc0e8e18a2d45f986e4c28937cff
            • Opcode Fuzzy Hash: a6f4a117456a64615db5b8149c1d3ddbac1c46967b9aa1b07a2a104750b3b100
            • Instruction Fuzzy Hash: AF71B131800206DFCF22CF64C894AEA7BB6FF58321F14836AFD555A2A6C7399841DF61
            APIs
            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0075F910), ref: 00748E3D
            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0075F910), ref: 00748E71
            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00748FEB
            • SysFreeString.OLEAUT32(?), ref: 00749015
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Free$FileLibraryModuleNamePathQueryStringType
            • String ID:
            • API String ID: 560350794-0
            • Opcode ID: 70e54ef87d64da1ad17ff6284c3f95769e3c3f4c63fb11111266eeb006c49160
            • Instruction ID: 25af19cf3bc27912f49108ee26b04b33f760bacdff9bb3353846599acc0156a8
            • Opcode Fuzzy Hash: 70e54ef87d64da1ad17ff6284c3f95769e3c3f4c63fb11111266eeb006c49160
            • Instruction Fuzzy Hash: 09F15A71A00209EFCF44DF94C888EAEB7BAFF49315F108099F915AB251DB35AE45CB51
            APIs
            • _memset.LIBCMT ref: 0074F7C9
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0074F95C
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0074F980
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0074F9C0
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0074F9E2
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0074FB5E
            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0074FB90
            • CloseHandle.KERNEL32(?), ref: 0074FBBF
            • CloseHandle.KERNEL32(?), ref: 0074FC36
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
            • String ID:
            • API String ID: 4090791747-0
            • Opcode ID: 62460e10fa80162ec51de772c2ba74f42386d7bf76e47594c30c08e177ceb417
            • Instruction ID: 8e3e3c7dc9d6703307f48c1c2200b9070020109b673e82cf8c2d58172cc62803
            • Opcode Fuzzy Hash: 62460e10fa80162ec51de772c2ba74f42386d7bf76e47594c30c08e177ceb417
            • Instruction Fuzzy Hash: C4E1C031604341EFD714EF24C891B6ABBE5AF89354F18846DF8899B3A2DB35EC40CB56
            APIs
              • Part of subcall function 007346AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007336DB,?), ref: 007346CC
              • Part of subcall function 007346AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007336DB,?), ref: 007346E5
              • Part of subcall function 00734AD8: GetFileAttributesW.KERNEL32(?,0073374F), ref: 00734AD9
            • lstrcmpiW.KERNEL32(?,?), ref: 00734DE7
            • _wcscmp.LIBCMT ref: 00734E01
            • MoveFileW.KERNEL32(?,?), ref: 00734E1C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
            • String ID:
            • API String ID: 793581249-0
            • Opcode ID: aefe3164d56676e0655dfff3a937d3647923f56ca2b9feddc18ae970a0dc0f8f
            • Instruction ID: 2d3f5066cbc1cb72d488ad01102e2faf7db19001f5d5d8be0a84bd7861888a8e
            • Opcode Fuzzy Hash: aefe3164d56676e0655dfff3a937d3647923f56ca2b9feddc18ae970a0dc0f8f
            • Instruction Fuzzy Hash: BD5165B24083859BD764DB94D8819DFB3ECAF85300F04492EF685D3152EF78B688CB5A
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00758731
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: 1bb1ceb9d0854e5a4092f2cdffc33df981dbf43cd0b95d0f53982b78cbf5c1a1
            • Instruction ID: 5e029abf1aec56078d1932d3066b2a2d892386da0655b5187e18fa95b2456d0f
            • Opcode Fuzzy Hash: 1bb1ceb9d0854e5a4092f2cdffc33df981dbf43cd0b95d0f53982b78cbf5c1a1
            • Instruction Fuzzy Hash: AC51E630500204FFEB609B69CC89BD93B64EB05312F604516FE14F61E1CFF9A988CB96
            APIs
            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0070C477
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0070C499
            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0070C4B1
            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0070C4CF
            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0070C4F0
            • DestroyIcon.USER32(00000000), ref: 0070C4FF
            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0070C51C
            • DestroyIcon.USER32(?), ref: 0070C52B
              • Part of subcall function 0075A4E1: DeleteObject.GDI32(00000000), ref: 0075A51A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
            • String ID:
            • API String ID: 2819616528-0
            • Opcode ID: 0b9f0f01b01790a5ea94a8bdf68791ed1748e11afe073fb901c6873e95b2833a
            • Instruction ID: 8de7ffb93b942749f0fdf946953a03ef533d0da61342e50ce1af61f1abc9f52a
            • Opcode Fuzzy Hash: 0b9f0f01b01790a5ea94a8bdf68791ed1748e11afe073fb901c6873e95b2833a
            • Instruction Fuzzy Hash: 8A516974A1020AEFDB21DF24DC55FAA3BE6EB68311F10462AF902972D0D7B4AD91DB50
            APIs
              • Part of subcall function 0072AC37: GetWindowThreadProcessId.USER32(?,00000000), ref: 0072AC57
              • Part of subcall function 0072AC37: GetCurrentThreadId.KERNEL32 ref: 0072AC5E
              • Part of subcall function 0072AC37: AttachThreadInput.USER32(00000000,?,00729945,?,00000001), ref: 0072AC65
            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00729950
            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 0072996D
            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00729970
            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00729979
            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00729997
            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0072999A
            • MapVirtualKeyW.USER32(00000025,00000000), ref: 007299A3
            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007299BA
            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007299BD
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
            • String ID:
            • API String ID: 2014098862-0
            • Opcode ID: 1989f180d4abe699738abe32952ba9f734a1e4135b3e53286f335dee35a9d4ea
            • Instruction ID: 962bff91db9e094580eef8f4535c7fbd701ebd571c87a60bd28e51bd21213874
            • Opcode Fuzzy Hash: 1989f180d4abe699738abe32952ba9f734a1e4135b3e53286f335dee35a9d4ea
            • Instruction Fuzzy Hash: C711E571950618FFF6106B60DC49FAA7B1DEB4C752F104429F344AB0A0C9F66C50DAB8
            APIs
            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00728864,00000B00,?,?), ref: 00728BEC
            • HeapAlloc.KERNEL32(00000000,?,00728864,00000B00,?,?), ref: 00728BF3
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00728864,00000B00,?,?), ref: 00728C08
            • GetCurrentProcess.KERNEL32(?,00000000,?,00728864,00000B00,?,?), ref: 00728C10
            • DuplicateHandle.KERNEL32(00000000,?,00728864,00000B00,?,?), ref: 00728C13
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00728864,00000B00,?,?), ref: 00728C23
            • GetCurrentProcess.KERNEL32(00728864,00000000,?,00728864,00000B00,?,?), ref: 00728C2B
            • DuplicateHandle.KERNEL32(00000000,?,00728864,00000B00,?,?), ref: 00728C2E
            • CreateThread.KERNEL32(00000000,00000000,00728C54,00000000,00000000,00000000), ref: 00728C48
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: 1963b314d6fdb30a1c02278509fa9f0be0a45cfb1bcff958cb76115e49b5be12
            • Instruction ID: 697a97cffb4aaf1156b1eba40c69dd440fba6d35493ad41d34c0f6452619c1ff
            • Opcode Fuzzy Hash: 1963b314d6fdb30a1c02278509fa9f0be0a45cfb1bcff958cb76115e49b5be12
            • Instruction Fuzzy Hash: 2601ACB5240748FFE610AB65DC49FAB3B6CEB89711F008421FA05DB191CAB598008A25
            APIs
              • Part of subcall function 00727432: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?,?,?,0072777D), ref: 0072744F
              • Part of subcall function 00727432: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?,?), ref: 0072746A
              • Part of subcall function 00727432: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?,?), ref: 00727478
              • Part of subcall function 00727432: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?), ref: 00727488
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0074991B
            • _memset.LIBCMT ref: 00749928
            • _memset.LIBCMT ref: 00749A6B
            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00749A97
            • CoTaskMemFree.OLE32(?), ref: 00749AA2
            Strings
            • NULL Pointer assignment, xrefs: 00749AF0
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
            • String ID: NULL Pointer assignment
            • API String ID: 1300414916-2785691316
            • Opcode ID: 2c0c0016bf79bf58c04369ecd4680740ba152c54ec669f274abee2c0d54fae32
            • Instruction ID: 6d3a96869712fdd9ce7d943ee8083ae4040657de181767d684a11b076b06dc8b
            • Opcode Fuzzy Hash: 2c0c0016bf79bf58c04369ecd4680740ba152c54ec669f274abee2c0d54fae32
            • Instruction Fuzzy Hash: 1C912871D00229EBDB10DFA4DC85EDEBBB9EF08710F10815AF519A7281DB75AA44CFA0
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00756E56
            • SendMessageW.USER32(?,00001036,00000000,?), ref: 00756E6A
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00756E84
            • _wcscat.LIBCMT ref: 00756EDF
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00756EF6
            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00756F24
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat
            • String ID: SysListView32
            • API String ID: 307300125-78025650
            • Opcode ID: a0ad4e4d3e0bea66d49986256d1d2db7eb21f52247c2d68862078c89cb6e6687
            • Instruction ID: e882e2e369eaf4fa4718a1497034d14442889eca416b0f3eb5e036c540a5a84d
            • Opcode Fuzzy Hash: a0ad4e4d3e0bea66d49986256d1d2db7eb21f52247c2d68862078c89cb6e6687
            • Instruction Fuzzy Hash: 6B41A370A00308EBEB219F64CC85BEE77F9EF08351F50446AF945E7191D7BA9D888B64
            APIs
              • Part of subcall function 00733C99: CreateToolhelp32Snapshot.KERNEL32 ref: 00733CBE
              • Part of subcall function 00733C99: Process32FirstW.KERNEL32(00000000,?), ref: 00733CCC
              • Part of subcall function 00733C99: CloseHandle.KERNEL32(00000000), ref: 00733D96
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0074EAB8
            • GetLastError.KERNEL32 ref: 0074EACB
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0074EAFA
            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0074EB77
            • GetLastError.KERNEL32(00000000), ref: 0074EB82
            • CloseHandle.KERNEL32(00000000), ref: 0074EBB7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
            • String ID: SeDebugPrivilege
            • API String ID: 2533919879-2896544425
            • Opcode ID: 9a90e7534d83a0f9bfa10727043ecc1ffed5c1c4a6f69feacd437ea23ab51694
            • Instruction ID: e04db0d75f2902df11a0f0c194d2f0702f3d064247c2ac9cc95f62f7582a9069
            • Opcode Fuzzy Hash: 9a90e7534d83a0f9bfa10727043ecc1ffed5c1c4a6f69feacd437ea23ab51694
            • Instruction Fuzzy Hash: 31419D716002119FDB24EF54CC99F6DB7A6FF40724F08845DF9429B2D2CBB9A804CB9A
            APIs
            • LoadIconW.USER32(00000000,00007F03), ref: 007330CD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2457776203-404129466
            • Opcode ID: 596912b4fc07d6de200cba18df69ba88f1a9d4c292688af7350091d991848489
            • Instruction ID: ced9966922e6279b6e723cf74029f3d5f05865ac537ad902e9bc6b3baf89ec47
            • Opcode Fuzzy Hash: 596912b4fc07d6de200cba18df69ba88f1a9d4c292688af7350091d991848489
            • Instruction Fuzzy Hash: 2F11EB3564835BBAF738AA54DC82DBB779DDF05720F10402AF60456283DEBD9F4046B5
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00734353
            • LoadStringW.USER32(00000000), ref: 0073435A
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00734370
            • LoadStringW.USER32(00000000), ref: 00734377
            • _wprintf.LIBCMT ref: 0073439D
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007343BB
            Strings
            • %s (%d) : ==> %s: %s %s, xrefs: 00734398
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_wprintf
            • String ID: %s (%d) : ==> %s: %s %s
            • API String ID: 3648134473-3128320259
            • Opcode ID: 585bc4be91976dbf9a201076b4c9cb685182e04ea98566dc6a93adbc62c7b01e
            • Instruction ID: 14ac10f3b6598c4038d7df176a9076e26e28df2b8998f977c8a71cd8974df9e6
            • Opcode Fuzzy Hash: 585bc4be91976dbf9a201076b4c9cb685182e04ea98566dc6a93adbc62c7b01e
            • Instruction Fuzzy Hash: 9D014FF290030CBFE751ABA09D89EE7776CDB08302F4045A5FB45E2051EAB89E854B75
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • GetSystemMetrics.USER32(0000000F), ref: 0075D4E6
            • GetSystemMetrics.USER32(0000000F), ref: 0075D506
            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0075D741
            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0075D75F
            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0075D780
            • ShowWindow.USER32(00000003,00000000), ref: 0075D79F
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0075D7C4
            • DefDlgProcW.USER32(?,00000005,?,?), ref: 0075D7E7
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
            • String ID:
            • API String ID: 1211466189-0
            • Opcode ID: 39a5032f9b4de5ae31b449207ecea0b66a175237dcc702136ba9c156d3f953a5
            • Instruction ID: c0a968fb5be2fceaf5e9b75be1f7cb0bf4d8f15c19442ea2154320ffa8b283f5
            • Opcode Fuzzy Hash: 39a5032f9b4de5ae31b449207ecea0b66a175237dcc702136ba9c156d3f953a5
            • Instruction Fuzzy Hash: 7AB17A71500229EFDF24CF68C9857EE7BB1FF08712F088069EC489A295E7B8AD55CB50
            APIs
            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0070C347,00000004,00000000,00000000,00000000), ref: 006D2ACF
            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0070C347,00000004,00000000,00000000,00000000,000000FF), ref: 006D2B17
            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0070C347,00000004,00000000,00000000,00000000), ref: 0070C39A
            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0070C347,00000004,00000000,00000000,00000000), ref: 0070C406
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ShowWindow
            • String ID:
            • API String ID: 1268545403-0
            • Opcode ID: d378d4cf60bae4994ab5a6ca644943cffd95c506922aed8f42853ec63c7c274f
            • Instruction ID: 7d9a5d88219c349b8681d55b718cc7746c52d5ae5ab3a03025e37d919076cfad
            • Opcode Fuzzy Hash: d378d4cf60bae4994ab5a6ca644943cffd95c506922aed8f42853ec63c7c274f
            • Instruction Fuzzy Hash: 2741DB30A14781DAC7368B289DACBAB7BD7EB65304F5CC91FE047C67A0C6B99842D711
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00737186
              • Part of subcall function 006F0F36: std::exception::exception.LIBCMT ref: 006F0F6C
              • Part of subcall function 006F0F36: __CxxThrowException@8.LIBCMT ref: 006F0F81
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007371BD
            • EnterCriticalSection.KERNEL32(?), ref: 007371D9
            • _memmove.LIBCMT ref: 00737227
            • _memmove.LIBCMT ref: 00737244
            • LeaveCriticalSection.KERNEL32(?), ref: 00737253
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00737268
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00737287
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
            • String ID:
            • API String ID: 256516436-0
            • Opcode ID: 29c87678bd78653377f70a016e4d3eedd2790e9b03f10a8241b752168b115681
            • Instruction ID: 491c4f8a11fa48441f38fa7fe063b33898ff5a357b905d6cac4694654bbb389b
            • Opcode Fuzzy Hash: 29c87678bd78653377f70a016e4d3eedd2790e9b03f10a8241b752168b115681
            • Instruction Fuzzy Hash: 6C318E71900209EBEF209F64DC85AAF7778FF44310F1481A9F9049B246DB749A10CBA4
            APIs
            • DeleteObject.GDI32(00000000), ref: 0075621D
            • GetDC.USER32(00000000), ref: 00756225
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00756230
            • ReleaseDC.USER32(00000000,00000000), ref: 0075623C
            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00756278
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00756289
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0075905C,?,?,000000FF,00000000,?,000000FF,?), ref: 007562C3
            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007562E3
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
            • String ID:
            • API String ID: 3864802216-0
            • Opcode ID: b337587fcd459ab9b32602ab45aacdf1de04863c3f0eb26da6179d139f43cddc
            • Instruction ID: 519e0b54f6177cea92b283b638e4e702f14051d40e8cb72ded48fcef27f7fad4
            • Opcode Fuzzy Hash: b337587fcd459ab9b32602ab45aacdf1de04863c3f0eb26da6179d139f43cddc
            • Instruction Fuzzy Hash: 20314D76201214BFEB118F54DC4AFEB3BA9FF09752F044065FE089A191D6B99C45CBA4
            APIs
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
              • Part of subcall function 006EFE06: _wcscpy.LIBCMT ref: 006EFE29
            • _wcstok.LIBCMT ref: 0073ED20
            • _wcscpy.LIBCMT ref: 0073EDAF
            • _memset.LIBCMT ref: 0073EDE2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
            • String ID: X
            • API String ID: 774024439-3081909835
            • Opcode ID: f1e17be025f6770c90f99d495fd9ee5f24875e2ec7077f6a43c4dc25cba5b105
            • Instruction ID: 2bc4e2f58b23578ee1a81ab4e5b31fa20860158bdb2e4de3c36414d4cdaeecb9
            • Opcode Fuzzy Hash: f1e17be025f6770c90f99d495fd9ee5f24875e2ec7077f6a43c4dc25cba5b105
            • Instruction Fuzzy Hash: 28C181319087019FD7A4EF24C885A5AB7E1FF84310F14492EF8998B3A2DB74ED05CB96
            APIs
            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00746D16
            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00746D37
            • WSAGetLastError.WSOCK32(00000000), ref: 00746D4A
            • htons.WSOCK32(?,?,?,00000000,?), ref: 00746E00
            • inet_ntoa.WSOCK32(?), ref: 00746DBD
              • Part of subcall function 0072ABF4: _strlen.LIBCMT ref: 0072ABFE
              • Part of subcall function 0072ABF4: _memmove.LIBCMT ref: 0072AC20
            • _strlen.LIBCMT ref: 00746E5A
            • _memmove.LIBCMT ref: 00746EC3
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
            • String ID:
            • API String ID: 3619996494-0
            • Opcode ID: 8639ded40eaaa555f77a69ee414f3e684a3f2c6e52ead39a06d838f854845dbb
            • Instruction ID: b4b71aa58ebd897f712c7b26b622a2614b6a45ca79f5a0bdb61bb866084f4a4b
            • Opcode Fuzzy Hash: 8639ded40eaaa555f77a69ee414f3e684a3f2c6e52ead39a06d838f854845dbb
            • Instruction Fuzzy Hash: 9F81FF71A04310ABD710EF24CC86E6BB3EAEF85714F04491EF5559B2A2DB74ED00CBA6
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6ff07ba5e249f53c6284d9f79b40ebcfcb4efa08a87c0cc8d0b41f983d935221
            • Instruction ID: daafc1632368d78dd5478807050387b5030a176a26f5609f7f2e123dac992ed9
            • Opcode Fuzzy Hash: 6ff07ba5e249f53c6284d9f79b40ebcfcb4efa08a87c0cc8d0b41f983d935221
            • Instruction Fuzzy Hash: 56714B70900109FFCB049F98C844AAEBBBAFF86314F14815AF915AB391C774AA51CBA4
            APIs
            • IsWindow.USER32(010161E8), ref: 0075B41F
            • IsWindowEnabled.USER32(010161E8), ref: 0075B42B
            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0075B50F
            • SendMessageW.USER32(010161E8,000000B0,?,?), ref: 0075B546
            • IsDlgButtonChecked.USER32(?,?), ref: 0075B583
            • GetWindowLongW.USER32(010161E8,000000EC), ref: 0075B5A5
            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0075B5BD
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
            • String ID:
            • API String ID: 4072528602-0
            • Opcode ID: 3c049b5e6a96fcf284c94a39929087cba7f55e17ffcf3b0e37120f1bfe1ba2b7
            • Instruction ID: 28f3d67e3e18223039a9658847c9cccbb09c3c3d500ef3e7733e057f6f5952e5
            • Opcode Fuzzy Hash: 3c049b5e6a96fcf284c94a39929087cba7f55e17ffcf3b0e37120f1bfe1ba2b7
            • Instruction Fuzzy Hash: DD71CE34600244EFDB319FA4C894FFA7BB5EF09302F148069ED45973A2C7B9A959CB10
            APIs
            • _memset.LIBCMT ref: 0074F55C
            • _memset.LIBCMT ref: 0074F625
            • ShellExecuteExW.SHELL32(?), ref: 0074F66A
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
              • Part of subcall function 006EFE06: _wcscpy.LIBCMT ref: 006EFE29
            • GetProcessId.KERNEL32(00000000), ref: 0074F6E1
            • CloseHandle.KERNEL32(00000000), ref: 0074F710
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
            • String ID: @
            • API String ID: 3522835683-2766056989
            • Opcode ID: 3294cdb55d13985d56452ad5ae93181d5984bef140b803152c7a551f3518cad3
            • Instruction ID: bcb56878c9725d115cffd762010e48ccc378dfb1a6613fa68de8579400f2b8d4
            • Opcode Fuzzy Hash: 3294cdb55d13985d56452ad5ae93181d5984bef140b803152c7a551f3518cad3
            • Instruction Fuzzy Hash: C5619F75A00619DFCB14EF64C9819AEBBF6FF48310F15846EE846AB361DB34AD40CB94
            APIs
            • GetParent.USER32(?), ref: 007312BD
            • GetKeyboardState.USER32(?), ref: 007312D2
            • SetKeyboardState.USER32(?), ref: 00731333
            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00731361
            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00731380
            • PostMessageW.USER32(?,00000101,00000012,?), ref: 007313C6
            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007313E9
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 5f658c9fae5d2526d087ce7678abe0f19771af6554d2144a1f32113d81131448
            • Instruction ID: b0d2e37c08c35d0939263da8da8bfb5c8b76e4e26cce9cb3769a59028ddeb831
            • Opcode Fuzzy Hash: 5f658c9fae5d2526d087ce7678abe0f19771af6554d2144a1f32113d81131448
            • Instruction Fuzzy Hash: 3151C1A0A087D57DFB364634CC49BBABFA96F06304F888589E0D5868C3C6DCAC94D761
            APIs
            • GetParent.USER32(00000000), ref: 007310D6
            • GetKeyboardState.USER32(?), ref: 007310EB
            • SetKeyboardState.USER32(?), ref: 0073114C
            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00731178
            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00731195
            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007311D9
            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007311FA
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 237f9159a163be2109b2ae1445eb9ae0ceb6ffde765e698eca85484a8bcdb67f
            • Instruction ID: 23a856b463ff9647268ea65a7f79bfa55afc7c0da5962e4d998297ad55f835c3
            • Opcode Fuzzy Hash: 237f9159a163be2109b2ae1445eb9ae0ceb6ffde765e698eca85484a8bcdb67f
            • Instruction Fuzzy Hash: 975128A06047DA7DFB3687348C45BBBBFA96B06300F488589E1D54A8C3D29CEC98D750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _wcsncpy$LocalTime
            • String ID:
            • API String ID: 2945705084-0
            • Opcode ID: 1fc717207970661d5b8f4fe0a30344b23f6bf3ca597887193576dc4a782cc81b
            • Instruction ID: ae7379433bfdefa2670c268bb98e3baa52fa343248f0121732ad1322e09e27c5
            • Opcode Fuzzy Hash: 1fc717207970661d5b8f4fe0a30344b23f6bf3ca597887193576dc4a782cc81b
            • Instruction Fuzzy Hash: F441C5A6C2051875DB51EBB49C469EF77B99F05310F10846AF608E3222FB389704C7ED
            APIs
            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0072D8E3
            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0072D919
            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0072D92A
            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0072D9AC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorMode$AddressCreateInstanceProc
            • String ID: ,,v$DllGetClassObject
            • API String ID: 753597075-302409378
            • Opcode ID: 61b07b70243744ae171da50278a7828ce1726a64bd7e8acb6675911bffae71e7
            • Instruction ID: ac17d21cf3bc8882c84d652ffe6878f3bb84d0edc7e1c14df93b97a48921adb9
            • Opcode Fuzzy Hash: 61b07b70243744ae171da50278a7828ce1726a64bd7e8acb6675911bffae71e7
            • Instruction Fuzzy Hash: D4419DB1600614EFDB24DF54D884A9ABBB9EF45314F1580A9FC459F246D7B8EE80CBA0
            APIs
              • Part of subcall function 007346AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007336DB,?), ref: 007346CC
              • Part of subcall function 007346AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007336DB,?), ref: 007346E5
            • lstrcmpiW.KERNEL32(?,?), ref: 007336FB
            • _wcscmp.LIBCMT ref: 00733717
            • MoveFileW.KERNEL32(?,?), ref: 0073372F
            • _wcscat.LIBCMT ref: 00733777
            • SHFileOperationW.SHELL32(?), ref: 007337E3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
            • String ID: \*.*
            • API String ID: 1377345388-1173974218
            • Opcode ID: 4db2b99cd7c2e7e8d324a6dd3aa51d786c8e735701dec4fa54216fed89cc4e7b
            • Instruction ID: 6f405e59e8ac76894eaf4de072f96aa922ff586ab289a6562cc9da791e331314
            • Opcode Fuzzy Hash: 4db2b99cd7c2e7e8d324a6dd3aa51d786c8e735701dec4fa54216fed89cc4e7b
            • Instruction Fuzzy Hash: 6F419FB25083459AD765EF64C485ADBB7E8EF89380F00092EF48AC3162EA38D748C756
            APIs
            • _memset.LIBCMT ref: 007572DC
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00757383
            • IsMenu.USER32(?), ref: 0075739B
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007573E3
            • DrawMenuBar.USER32 ref: 007573F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Menu$Item$DrawInfoInsert_memset
            • String ID: 0
            • API String ID: 3866635326-4108050209
            • Opcode ID: 00c57e8d809b15550652074a2d09adf620889f917a013facd84d2043fc7f4907
            • Instruction ID: 758b22ccd931af461ca6edec7b6ecd72fd71893086c772707c682ae8a2c92cc6
            • Opcode Fuzzy Hash: 00c57e8d809b15550652074a2d09adf620889f917a013facd84d2043fc7f4907
            • Instruction Fuzzy Hash: 4F415970A04249EFDB21DF50E884EEABBF8FB04326F048029ED159B260D7B4AD15DF90
            APIs
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0075105C
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00751086
            • FreeLibrary.KERNEL32(00000000), ref: 0075113D
              • Part of subcall function 0075102D: RegCloseKey.ADVAPI32(?), ref: 007510A3
              • Part of subcall function 0075102D: FreeLibrary.KERNEL32(?), ref: 007510F5
              • Part of subcall function 0075102D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00751118
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 007510E0
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: EnumFreeLibrary$CloseDeleteOpen
            • String ID:
            • API String ID: 395352322-0
            • Opcode ID: 3d81ba7d2edd975d26e1d2aaf19ffdcd4127ce2b5fd0c2c02db5924017181614
            • Instruction ID: 436eef864f90abe70fc5101625da356d4a686a16ba4d36e18cc6a643c11475ee
            • Opcode Fuzzy Hash: 3d81ba7d2edd975d26e1d2aaf19ffdcd4127ce2b5fd0c2c02db5924017181614
            • Instruction Fuzzy Hash: 1D31527190110DBFDB14DB90DC89EFFB7BCEF08302F4041A9E915A2141EBB85E899BA4
            APIs
            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0075631E
            • GetWindowLongW.USER32(010161E8,000000F0), ref: 00756351
            • GetWindowLongW.USER32(010161E8,000000F0), ref: 00756386
            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007563B8
            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007563E2
            • GetWindowLongW.USER32(00000000,000000F0), ref: 007563F3
            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0075640D
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: LongWindow$MessageSend
            • String ID:
            • API String ID: 2178440468-0
            • Opcode ID: a6998a2d04c22e542be6fdf1c0dccf7e0daf60c1410fc128420f03eea74d43a6
            • Instruction ID: 8aebe7b98de0fbc8220cd553cfdcf69c2cdc91cba59e9bdbd2fcf559f35f1520
            • Opcode Fuzzy Hash: a6998a2d04c22e542be6fdf1c0dccf7e0daf60c1410fc128420f03eea74d43a6
            • Instruction Fuzzy Hash: A6311430604250DFEB21CF18DC84F9537E1FB4A752F5981A4F9018F2B2CBBAA845DB55
            APIs
              • Part of subcall function 00747EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00747ECB
            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007462DC
            • WSAGetLastError.WSOCK32(00000000), ref: 007462EB
            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00746324
            • connect.WSOCK32(00000000,?,00000010), ref: 0074632D
            • WSAGetLastError.WSOCK32 ref: 00746337
            • closesocket.WSOCK32(00000000), ref: 00746360
            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00746379
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
            • String ID:
            • API String ID: 910771015-0
            • Opcode ID: cafa0c26c62e748928ca0fb22a53605161fe5ec9055b2617b560ca25abf4ef75
            • Instruction ID: d175df9fa6619019e3c763dd1262132b5d2cde259cf1d9489ba23ead8e07e099
            • Opcode Fuzzy Hash: cafa0c26c62e748928ca0fb22a53605161fe5ec9055b2617b560ca25abf4ef75
            • Instruction Fuzzy Hash: 5631B631600218AFDB10AF64CC85BBE7BADEF45725F048069FD0597291DBB8AD04CBA6
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: 57ed5f018b82f19fe6300bb0b5a1b044707b5439bd3ffe2a24e2d9bfb2200f7b
            • Instruction ID: 8ebb6e6235c49b8199c1231887f262eee5ad537c844c995a863e6d0e83805ef3
            • Opcode Fuzzy Hash: 57ed5f018b82f19fe6300bb0b5a1b044707b5439bd3ffe2a24e2d9bfb2200f7b
            • Instruction Fuzzy Hash: 51214C3210863576D270FA25EC02FB773B9AF52310F50803AF9C686182FBA86D82C395
            APIs
              • Part of subcall function 006D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 006D1D73
              • Part of subcall function 006D1D35: GetStockObject.GDI32(00000011), ref: 006D1D87
              • Part of subcall function 006D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 006D1D91
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00757664
            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00757671
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0075767C
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0075768B
            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00757697
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$CreateObjectStockWindow
            • String ID: Msctls_Progress32
            • API String ID: 1025951953-3636473452
            • Opcode ID: ee4737f5304d63cd86c56c31327db2b5630f5edbf5652748f87a6163433d5382
            • Instruction ID: b27098254fbc96585e9227d7cd3c1c400e7cf0dba28ae0db375a3668770123fe
            • Opcode Fuzzy Hash: ee4737f5304d63cd86c56c31327db2b5630f5edbf5652748f87a6163433d5382
            • Instruction Fuzzy Hash: F011B2B2150219BFEF159F64DC85EEB7F6DEF08758F014115FA04A6090CBB6AC21DBA4
            APIs
            • _memset.LIBCMT ref: 0075B678
            • _memset.LIBCMT ref: 0075B687
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00796F20,00796F64), ref: 0075B6B6
            • CloseHandle.KERNEL32 ref: 0075B6C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memset$CloseCreateHandleProcess
            • String ID: oy$doy
            • API String ID: 3277943733-4102241462
            • Opcode ID: a82e4861e0eb589fccc3652a9c539d1e2aaea791d13e5e0cefa5cabab5176bb9
            • Instruction ID: 4d6c48d81900394308f82e500b66a845264c631c9f47ec96c7d777367b896a8e
            • Opcode Fuzzy Hash: a82e4861e0eb589fccc3652a9c539d1e2aaea791d13e5e0cefa5cabab5176bb9
            • Instruction Fuzzy Hash: 7EF082B2640308BAF6102761BC46FBB3E5EEB09395F008135FB08D51A2D7B95C018BAC
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,006F41D2,?), ref: 006F4123
            • GetProcAddress.KERNEL32(00000000), ref: 006F412A
            • EncodePointer.KERNEL32(00000000), ref: 006F4136
            • DecodePointer.KERNEL32(00000001,006F41D2,?), ref: 006F4153
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
            • String ID: RoInitialize$combase.dll
            • API String ID: 3489934621-340411864
            • Opcode ID: 91af0afa5b93489e43ff0e11928b5276b26ba12cd18e29863c1e33150eca9f45
            • Instruction ID: 5698fae0c6392663ae01ddd49f9cb3fc704976730ed24ca7e2d1bde4da160268
            • Opcode Fuzzy Hash: 91af0afa5b93489e43ff0e11928b5276b26ba12cd18e29863c1e33150eca9f45
            • Instruction Fuzzy Hash: B2E01AB47D0B48AEEB106B70EC09BA53AA5B716B47F10C425F922D61F0CBFD45828F08
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,006F40F8), ref: 006F41F8
            • GetProcAddress.KERNEL32(00000000), ref: 006F41FF
            • EncodePointer.KERNEL32(00000000), ref: 006F420A
            • DecodePointer.KERNEL32(006F40F8), ref: 006F4225
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
            • String ID: RoUninitialize$combase.dll
            • API String ID: 3489934621-2819208100
            • Opcode ID: 28458a5489e656716dfab9f32a9f893729f919b6219116c2f89eb6e6a3438922
            • Instruction ID: fbc7ed8584cd401afc42abed6dbe4ff57854bc3e45fa6945747861d1ba82324f
            • Opcode Fuzzy Hash: 28458a5489e656716dfab9f32a9f893729f919b6219116c2f89eb6e6a3438922
            • Instruction Fuzzy Hash: 80E0BFB06D1B08ABEB609B61EC0DB9536A5B704743F10C125F515D11B0CFBF4701CA1C
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove$__itow__swprintf
            • String ID:
            • API String ID: 3253778849-0
            • Opcode ID: d027cfa0694f563443b84c93fe108b1ac6900860a03bab4d85fe296abdf48ce7
            • Instruction ID: 96ca294e816fee4df912548e9edf158a7c39d4a6de15ebcda670e0c1f6d76749
            • Opcode Fuzzy Hash: d027cfa0694f563443b84c93fe108b1ac6900860a03bab4d85fe296abdf48ce7
            • Instruction Fuzzy Hash: 9D61CF3090065AABEF11EF20CC82EFE37A6AF04308F44851EF9555B293DB38AD11CB65
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 00750EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0074FE38,?,?), ref: 00750EBC
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00750348
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00750388
            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007503AB
            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007503D4
            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00750417
            • RegCloseKey.ADVAPI32(00000000), ref: 00750424
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
            • String ID:
            • API String ID: 4046560759-0
            • Opcode ID: 5a6ebd81a6c6ff80e3b9d9b1129e9e8a072e7118a77e6d50b7ee1d6621a62054
            • Instruction ID: 457bd561c9055dd48ea3f17ccef1ad958a97b1ba01683f98ddca6570bef1b9b4
            • Opcode Fuzzy Hash: 5a6ebd81a6c6ff80e3b9d9b1129e9e8a072e7118a77e6d50b7ee1d6621a62054
            • Instruction Fuzzy Hash: 55515A31508340AFD714EF64C885EAABBE9FF85315F04491DF985872A1DB75E908CB92
            APIs
            • GetMenu.USER32(?), ref: 00755864
            • GetMenuItemCount.USER32(00000000), ref: 0075589B
            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007558C3
            • GetMenuItemID.USER32(?,?), ref: 00755932
            • GetSubMenu.USER32(?,?), ref: 00755940
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 00755991
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Menu$Item$CountMessagePostString
            • String ID:
            • API String ID: 650687236-0
            • Opcode ID: 243801017a0d4253612a7f7809fc071a2d9bcfcc054b3a1bd2e105a4d054a679
            • Instruction ID: dd0bebb69dddbf878e3c7f6b4bd553495ba9e560a51da4294c9ac94b1bad89f0
            • Opcode Fuzzy Hash: 243801017a0d4253612a7f7809fc071a2d9bcfcc054b3a1bd2e105a4d054a679
            • Instruction Fuzzy Hash: 37518C31E00615EFCB10EFA4C855AEEB7B5EF48321F144059ED06AB351CBB8AE418B94
            APIs
            • VariantInit.OLEAUT32(?), ref: 0072F218
            • VariantClear.OLEAUT32(00000013), ref: 0072F28A
            • VariantClear.OLEAUT32(00000000), ref: 0072F2E5
            • _memmove.LIBCMT ref: 0072F30F
            • VariantClear.OLEAUT32(?), ref: 0072F35C
            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0072F38A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Variant$Clear$ChangeInitType_memmove
            • String ID:
            • API String ID: 1101466143-0
            • Opcode ID: dc7da06e1439500567c32543e4dced1378ed25038e9bd1ed64a02e9eaf2d787b
            • Instruction ID: 1f3907615d091869f0965ef9102286b21313f5266a5d12ea3bcfdb3c5de5bf88
            • Opcode Fuzzy Hash: dc7da06e1439500567c32543e4dced1378ed25038e9bd1ed64a02e9eaf2d787b
            • Instruction Fuzzy Hash: 435149B5A00219EFCB14DF58D884AAAB7B8FF4C314B158569ED59DB301E334EA11CFA0
            APIs
            • _memset.LIBCMT ref: 00732550
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0073259B
            • IsMenu.USER32(00000000), ref: 007325BB
            • CreatePopupMenu.USER32 ref: 007325EF
            • GetMenuItemCount.USER32(000000FF), ref: 0073264D
            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 0073267E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
            • String ID:
            • API String ID: 3311875123-0
            • Opcode ID: 4616de7de83bd1f5d006c93edfd3fcf319fce671b3b1ed2919e122423ddf46fc
            • Instruction ID: 8b68bd480ddf468798e569f354f5a895b089a0cce8a58ca79397b9c93502c875
            • Opcode Fuzzy Hash: 4616de7de83bd1f5d006c93edfd3fcf319fce671b3b1ed2919e122423ddf46fc
            • Instruction Fuzzy Hash: FF51B170600309DFEF21DF68D889AADBBF4BF44314F148159E81197293E7789906CB51
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • BeginPaint.USER32(?,?,?,?,?,?), ref: 006D179A
            • GetWindowRect.USER32(?,?), ref: 006D17FE
            • ScreenToClient.USER32(?,?), ref: 006D181B
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 006D182C
            • EndPaint.USER32(?,?), ref: 006D1876
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: PaintWindow$BeginClientLongRectScreenViewport
            • String ID:
            • API String ID: 1827037458-0
            • Opcode ID: 58284099d323b36079e9a94b197512254c4b112ef659cfb4c20891c677f60d81
            • Instruction ID: c8cd41c8bff350c6224436579395eb1d3c625c1180a053591c8dd426db3574b2
            • Opcode Fuzzy Hash: 58284099d323b36079e9a94b197512254c4b112ef659cfb4c20891c677f60d81
            • Instruction Fuzzy Hash: FF41D230500700EFDB11DF25CC84FBA7BE9EB46324F04422AFA948B2B1C7B49946DB65
            APIs
            • ShowWindow.USER32(007957B0,00000000,010161E8,?,?,007957B0,?,0075B5DC,?,?), ref: 0075B746
            • EnableWindow.USER32(00000000,00000000), ref: 0075B76A
            • ShowWindow.USER32(007957B0,00000000,010161E8,?,?,007957B0,?,0075B5DC,?,?), ref: 0075B7CA
            • ShowWindow.USER32(00000000,00000004,?,0075B5DC,?,?), ref: 0075B7DC
            • EnableWindow.USER32(00000000,00000001), ref: 0075B800
            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0075B823
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: 52a740be4e1992caba246c70d4c71555f08b288b5532518a3a74ca0f3be276c6
            • Instruction ID: deac67f67a3cdf3b3f941d3c8e32bce08e76128f9e376026f4475ab678977eaa
            • Opcode Fuzzy Hash: 52a740be4e1992caba246c70d4c71555f08b288b5532518a3a74ca0f3be276c6
            • Instruction Fuzzy Hash: D1412434600144EFDB25CF24C489BE47BE5FB49316F1885BAFD498F2A2C7B5A849CB91
            APIs
            • GetForegroundWindow.USER32(?,?,?,?,?,?,00744F57,?,?,00000000,00000001), ref: 007471C1
              • Part of subcall function 00743AB6: GetWindowRect.USER32(?,?), ref: 00743AC9
            • GetDesktopWindow.USER32 ref: 007471EB
            • GetWindowRect.USER32(00000000), ref: 007471F2
            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00747224
              • Part of subcall function 007352EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00735363
            • GetCursorPos.USER32(?), ref: 00747250
            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007472AE
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
            • String ID:
            • API String ID: 4137160315-0
            • Opcode ID: 7c4bd2eaf1c492642f82abc5f75b851228d6a4d70890529b6e78581c52b1f2e1
            • Instruction ID: b634576cfe6817835e448fdf414fef4bcc1761548f495811752c69796c594df4
            • Opcode Fuzzy Hash: 7c4bd2eaf1c492642f82abc5f75b851228d6a4d70890529b6e78581c52b1f2e1
            • Instruction Fuzzy Hash: 6B31E172509305AFD724DF14C849B9BB7E9FF88314F004929F589A7191DBB8EA08CB96
            APIs
              • Part of subcall function 007283D1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007283E8
              • Part of subcall function 007283D1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007283F2
              • Part of subcall function 007283D1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00728401
              • Part of subcall function 007283D1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00728408
              • Part of subcall function 007283D1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0072841E
            • GetLengthSid.ADVAPI32(?,00000000,00728757), ref: 00728B8C
            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00728B98
            • HeapAlloc.KERNEL32(00000000), ref: 00728B9F
            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00728BB8
            • GetProcessHeap.KERNEL32(00000000,00000000,00728757), ref: 00728BCC
            • HeapFree.KERNEL32(00000000), ref: 00728BD3
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
            • String ID:
            • API String ID: 3008561057-0
            • Opcode ID: 755805d980ee5ece8bc9da947333ae3b7822e6f9008587dde7f2afe05b86ed4d
            • Instruction ID: f8dd8facc3d2d379104729de3ea46510011f7117bcef1535257d3fc2dc7eae57
            • Opcode Fuzzy Hash: 755805d980ee5ece8bc9da947333ae3b7822e6f9008587dde7f2afe05b86ed4d
            • Instruction Fuzzy Hash: AB11AFB1502618FFDB909F64EC09BAF77A8EB45316F14802CE84597150DB7A9D00CB61
            APIs
            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0072890A
            • OpenProcessToken.ADVAPI32(00000000), ref: 00728911
            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00728920
            • CloseHandle.KERNEL32(00000004), ref: 0072892B
            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0072895A
            • DestroyEnvironmentBlock.USERENV(00000000), ref: 0072896E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
            • String ID:
            • API String ID: 1413079979-0
            • Opcode ID: ceb7598bc4a7a7efc21423823e94b424e4cc910087e8cb3017a635768752e7b4
            • Instruction ID: 146e4190e53744d352d5d8302a29f3ec204bb4e71891b54f622cc33a42edf612
            • Opcode Fuzzy Hash: ceb7598bc4a7a7efc21423823e94b424e4cc910087e8cb3017a635768752e7b4
            • Instruction Fuzzy Hash: F1115C7250121DABDF018FA4ED49BEE7BA9FF09309F048064FE04A2160C77A9D609B62
            APIs
            • GetDC.USER32(00000000), ref: 0072BA77
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0072BA88
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0072BA8F
            • ReleaseDC.USER32(00000000,00000000), ref: 0072BA97
            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0072BAAE
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0072BAC0
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CapsDevice$Release
            • String ID:
            • API String ID: 1035833867-0
            • Opcode ID: b33dabc50623e48d0df76cd4c549a8a55b3e377b0e5cb84e1ec66484845ff130
            • Instruction ID: fbc98bab0f0e1fdaf70820f770787fe151030f25e72d5db82bd60da54e0d621a
            • Opcode Fuzzy Hash: b33dabc50623e48d0df76cd4c549a8a55b3e377b0e5cb84e1ec66484845ff130
            • Instruction Fuzzy Hash: DA01A775E00318BBEF109BA59D49A5EBFB8EB48311F008076FA08E7291D6759D00CF91
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006F0313
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 006F031B
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006F0326
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006F0331
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 006F0339
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 006F0341
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: 4844013ab18127f6e25a90a5eb9af2ea5e36fd2e407e6cbdaa96d36aa2d53ad8
            • Instruction ID: 3b1d2d278ab6ea47de52b57e541a50a57173a653e47cab5954237c452027736b
            • Opcode Fuzzy Hash: 4844013ab18127f6e25a90a5eb9af2ea5e36fd2e407e6cbdaa96d36aa2d53ad8
            • Instruction Fuzzy Hash: E10148B0901759BDE3009F5A8C85A52FEA8FF19354F00411BE15847941C7F5A864CBE5
            APIs
            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007354A0
            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007354B6
            • GetWindowThreadProcessId.USER32(?,?), ref: 007354C5
            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007354D4
            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007354DE
            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007354E5
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
            • String ID:
            • API String ID: 839392675-0
            • Opcode ID: e7327fdd9f8d66b0fbb88b4b9d0fa7674b41b25b01c4fa4295c842ef71e5dbee
            • Instruction ID: 1d891b3596f6289bcefefb44b04968a365e6a5a4b71d2e5b2de9b088e2c356e5
            • Opcode Fuzzy Hash: e7327fdd9f8d66b0fbb88b4b9d0fa7674b41b25b01c4fa4295c842ef71e5dbee
            • Instruction Fuzzy Hash: ABF03631141658BBE7215B52DC0DEEF7F7CEFC6B12F004169FA04D1051D7E91A0186B9
            APIs
            • InterlockedExchange.KERNEL32(?,?), ref: 007372EC
            • EnterCriticalSection.KERNEL32(?,?,006E1044,?,?), ref: 007372FD
            • TerminateThread.KERNEL32(00000000,000001F6,?,006E1044,?,?), ref: 0073730A
            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,006E1044,?,?), ref: 00737317
              • Part of subcall function 00736CDE: CloseHandle.KERNEL32(00000000,?,00737324,?,006E1044,?,?), ref: 00736CE8
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0073732A
            • LeaveCriticalSection.KERNEL32(?,?,006E1044,?,?), ref: 00737331
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: dd4317222513a3881e0977b5018d0ca68db3a9fa19b4d87f40226662c3ca4c30
            • Instruction ID: bfbdc8c4fb1acbe95364621f9a9c85ec80cf38844d8b69d0a34461f9e19c2efa
            • Opcode Fuzzy Hash: dd4317222513a3881e0977b5018d0ca68db3a9fa19b4d87f40226662c3ca4c30
            • Instruction Fuzzy Hash: 9FF05EB6141712EBEB212B64ED8C9DF772AFF49303F004531F602914A1CBBA6811DBA4
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00728C5F
            • UnloadUserProfile.USERENV(?,?), ref: 00728C6B
            • CloseHandle.KERNEL32(?), ref: 00728C74
            • CloseHandle.KERNEL32(?), ref: 00728C7C
            • GetProcessHeap.KERNEL32(00000000,?), ref: 00728C85
            • HeapFree.KERNEL32(00000000), ref: 00728C8C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: 359d1c720d15f8255a1049b56ac5f4cb8b2de56ac951d9cb900bf1c6a4f4120e
            • Instruction ID: af45ecbb35d373e35d8aec2a6544b6894e57de15d6334603ff8041e4904dff77
            • Opcode Fuzzy Hash: 359d1c720d15f8255a1049b56ac5f4cb8b2de56ac951d9cb900bf1c6a4f4120e
            • Instruction Fuzzy Hash: 01E0C236004605FBDA012FE1EC0C98ABF69FB89323B508630F21981470CBBAA820DB58
            APIs
            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00762C7C,?), ref: 00727A12
            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00762C7C,?), ref: 00727A2A
            • CLSIDFromProgID.OLE32(?,?,00000000,0075FB80,000000FF,?,00000000,00000800,00000000,?,00762C7C,?), ref: 00727A4F
            • _memcmp.LIBCMT ref: 00727A70
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FromProg$FreeTask_memcmp
            • String ID: ,,v
            • API String ID: 314563124-1312938289
            • Opcode ID: bdaae5115723d6ecde59e3fa8b9b7ce70702097e4a3290996a924983e0e2e2e7
            • Instruction ID: 4aa00bb11a57b24de5f0c3c4c64ae0e132d203571663d94d7fe715fdbf36efc5
            • Opcode Fuzzy Hash: bdaae5115723d6ecde59e3fa8b9b7ce70702097e4a3290996a924983e0e2e2e7
            • Instruction Fuzzy Hash: 7C813D71A00219EFCB04DF94C984EEEB7B9FF89315F208199E506AB250DB75AE45CB60
            APIs
            • VariantInit.OLEAUT32(?), ref: 00748728
            • CharUpperBuffW.USER32(?,?), ref: 00748837
            • VariantClear.OLEAUT32(?), ref: 007489AF
              • Part of subcall function 0073760B: VariantInit.OLEAUT32(00000000), ref: 0073764B
              • Part of subcall function 0073760B: VariantCopy.OLEAUT32(00000000,?), ref: 00737654
              • Part of subcall function 0073760B: VariantClear.OLEAUT32(00000000), ref: 00737660
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Variant$ClearInit$BuffCharCopyUpper
            • String ID: AUTOIT.ERROR$Incorrect Parameter format
            • API String ID: 4237274167-1221869570
            • Opcode ID: 2b949b69e02a6031b00ab96dad00c07b2608fe0cf12e626af3a457b3f40a044d
            • Instruction ID: 3e0e636ec01e849726c0426db7f1b188e404f66b63a79c246f5d9d287e695f10
            • Opcode Fuzzy Hash: 2b949b69e02a6031b00ab96dad00c07b2608fe0cf12e626af3a457b3f40a044d
            • Instruction Fuzzy Hash: 58919B74608705DFC750EF28C48496EBBE5EF89314F14896EF89A8B362DB34E905CB52
            APIs
              • Part of subcall function 006EFE06: _wcscpy.LIBCMT ref: 006EFE29
            • _memset.LIBCMT ref: 00732E7F
            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00732EAE
            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00732F61
            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00732F8F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ItemMenu$Info$Default_memset_wcscpy
            • String ID: 0
            • API String ID: 4152858687-4108050209
            • Opcode ID: c9334bcd10bdceba79748cd487322a89435894fe23bb08da4c3b4f6759b8248d
            • Instruction ID: 8579a685f5524e690ecc33de0e2b55ffa643c92261d7c86550d49c79acab9fa5
            • Opcode Fuzzy Hash: c9334bcd10bdceba79748cd487322a89435894fe23bb08da4c3b4f6759b8248d
            • Instruction Fuzzy Hash: D351E1716083029EE725AF28D845A6BB7F4AF45310F144A2EF880D31A3DB78CD028796
            APIs
            • _memset.LIBCMT ref: 00732AB8
            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00732AD4
            • DeleteMenu.USER32(?,00000007,00000000), ref: 00732B1A
            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00795890,00000000), ref: 00732B63
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem_memset
            • String ID: 0
            • API String ID: 1173514356-4108050209
            • Opcode ID: 548ec845a240d143106c995bf99c54fe2b4503d7d67f273b7aeeedfbc8b43120
            • Instruction ID: f314cae192fc4b2912fc7162ab552bcaee4c9f87b2087896c40b622498426efb
            • Opcode Fuzzy Hash: 548ec845a240d143106c995bf99c54fe2b4503d7d67f273b7aeeedfbc8b43120
            • Instruction Fuzzy Hash: 3941B6B0204342DFE720DF24C885B6AF7E9AF85320F10455EF96597293E774E906CB56
            APIs
            • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0074D8D9
              • Part of subcall function 006D79AB: _memmove.LIBCMT ref: 006D79F9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BuffCharLower_memmove
            • String ID: cdecl$none$stdcall$winapi
            • API String ID: 3425801089-567219261
            • Opcode ID: 09f350ff662e297739760078cf651686aab11c870786a85a6b7690517961967b
            • Instruction ID: b763268bb1c8ee25d6a2f02a4cad0e3227ad59182c86416e5736bc99ab09b339
            • Opcode Fuzzy Hash: 09f350ff662e297739760078cf651686aab11c870786a85a6b7690517961967b
            • Instruction Fuzzy Hash: 37319E70904619ABCF20EF54C8909FEB3B5FF05710B148A2EE8A6977D1DB75AD05CB80
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 0072AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0072AEC7
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007291D6
            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007291E9
            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00729219
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$_memmove$ClassName
            • String ID: ComboBox$ListBox
            • API String ID: 365058703-1403004172
            • Opcode ID: 48cdca6b4923236288cce0d78a2365872d599787e04a233dd4472f592e42c3ef
            • Instruction ID: a1e068b5b00b8b4a8ee9a26011963ed720ff13094e34c58ea16abd5b12ae6833
            • Opcode Fuzzy Hash: 48cdca6b4923236288cce0d78a2365872d599787e04a233dd4472f592e42c3ef
            • Instruction Fuzzy Hash: DC21E471900218BBDB14AB64EC8ACFFB7A9EF45360F14412EF925972E1DB3D4D0A9614
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00741962
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00741988
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007419B8
            • InternetCloseHandle.WININET(00000000), ref: 007419FF
              • Part of subcall function 00742599: GetLastError.KERNEL32(?,?,0074192D,00000000,00000000,00000001), ref: 007425AE
              • Part of subcall function 00742599: SetEvent.KERNEL32(?,?,0074192D,00000000,00000000,00000001), ref: 007425C3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
            • String ID:
            • API String ID: 3113390036-3916222277
            • Opcode ID: 78992634cc73ebe1e3c274a7a0af266cd7956655570ff428eff7b68b8440fc21
            • Instruction ID: 7c18dd00ffe9f3ac18c4d1aa143b32964507f4e715a468eca620b3d0d3fa7a60
            • Opcode Fuzzy Hash: 78992634cc73ebe1e3c274a7a0af266cd7956655570ff428eff7b68b8440fc21
            • Instruction Fuzzy Hash: DF21D1B2600308BFEB11AF60DC95EBF77ACEB48745F50811AF40593240EB78AE4597A5
            APIs
              • Part of subcall function 006D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 006D1D73
              • Part of subcall function 006D1D35: GetStockObject.GDI32(00000011), ref: 006D1D87
              • Part of subcall function 006D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 006D1D91
            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00756493
            • LoadLibraryW.KERNEL32(?), ref: 0075649A
            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007564AF
            • DestroyWindow.USER32(?), ref: 007564B7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
            • String ID: SysAnimate32
            • API String ID: 4146253029-1011021900
            • Opcode ID: 148986610e32ab8c0233e380810d6a8e3df01f3db48e0f11f54855d6776c351f
            • Instruction ID: cdd8198376b714811a424bdcdde6e2ab51c7a5d031e63e93679a9562812b63cc
            • Opcode Fuzzy Hash: 148986610e32ab8c0233e380810d6a8e3df01f3db48e0f11f54855d6776c351f
            • Instruction Fuzzy Hash: BC21CF71600245ABEF104EA4DC80EFB37A9EF58366F908619FE10931A0C7B9CD859760
            APIs
            • GetStdHandle.KERNEL32(0000000C), ref: 00736E65
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00736E98
            • GetStdHandle.KERNEL32(0000000C), ref: 00736EAA
            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00736EE4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: 411fc192f4464d7ade9407eaa6fda8c0f94e774ae8482b8536e9f069d8bc7487
            • Instruction ID: bd5d772a5cfbcff2e4f22faab164f298b00a13cb8ee4744bf14dc6e16e347796
            • Opcode Fuzzy Hash: 411fc192f4464d7ade9407eaa6fda8c0f94e774ae8482b8536e9f069d8bc7487
            • Instruction Fuzzy Hash: E52160B9640305BBEF209F29DC09A9A7BB4BF45720F20C629FCA0D72D1DB7498548B50
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 00736F32
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00736F64
            • GetStdHandle.KERNEL32(000000F6), ref: 00736F75
            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00736FAF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: be719ba1505b1fd39933ec9096e3e4505862c0dc03382ba4b12b544312449059
            • Instruction ID: 2ff1f458da624301c02a16ce4a38c633b08ac8bd20dac44ae3a07d6b4d01859c
            • Opcode Fuzzy Hash: be719ba1505b1fd39933ec9096e3e4505862c0dc03382ba4b12b544312449059
            • Instruction Fuzzy Hash: 5321C571600316BBEB209F68AC04E9977F8BF45730F208A59FCA0E72D1DB749850CB65
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0073ACDE
            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0073AD32
            • __swprintf.LIBCMT ref: 0073AD4B
            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0075F910), ref: 0073AD89
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu
            • API String ID: 3164766367-685833217
            • Opcode ID: b7ed1944bbd9425c23cdf39841667c7c0d76ba4dfb47bbfa48734a3c1538f0db
            • Instruction ID: 33546647474b9d7f11749cb5747d583aa10024adfb6e59dc000e405c310d7063
            • Opcode Fuzzy Hash: b7ed1944bbd9425c23cdf39841667c7c0d76ba4dfb47bbfa48734a3c1538f0db
            • Instruction Fuzzy Hash: 6A217174A00209EFCB10EF64C985EEE7BB8EF49705B008069F505EB352DB75EA01CB61
            APIs
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
              • Part of subcall function 0072A15C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0072A179
              • Part of subcall function 0072A15C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0072A18C
              • Part of subcall function 0072A15C: GetCurrentThreadId.KERNEL32 ref: 0072A193
              • Part of subcall function 0072A15C: AttachThreadInput.USER32(00000000), ref: 0072A19A
            • GetFocus.USER32 ref: 0072A334
              • Part of subcall function 0072A1A5: GetParent.USER32(?), ref: 0072A1B3
            • GetClassNameW.USER32(?,?,00000100), ref: 0072A37D
            • EnumChildWindows.USER32(?,0072A3F5), ref: 0072A3A5
            • __swprintf.LIBCMT ref: 0072A3BF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
            • String ID: %s%d
            • API String ID: 1941087503-1110647743
            • Opcode ID: 593c1b09ede089a0920e7e84766912f28c12a68834c31094ff5193b96129fee8
            • Instruction ID: 37eafcf521da7c4f3ee629a793cdd26ffa129810934a891f38c33567574f43b8
            • Opcode Fuzzy Hash: 593c1b09ede089a0920e7e84766912f28c12a68834c31094ff5193b96129fee8
            • Instruction Fuzzy Hash: C011A271600219BBDF11BF64EC89FEA3779EF44711F00407AF908AA142DA7859558B76
            APIs
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0074ED1B
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0074ED4B
            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0074EE7E
            • CloseHandle.KERNEL32(?), ref: 0074EEFF
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Process$CloseCountersHandleInfoMemoryOpen
            • String ID:
            • API String ID: 2364364464-0
            • Opcode ID: c584a18107afc849af3993a02a239da52db85268ff7e63cc81dada796dad51e0
            • Instruction ID: 10e3e0971de9685f16d5bd3a077a965c688385499a1c3c1fafec9474be62818f
            • Opcode Fuzzy Hash: c584a18107afc849af3993a02a239da52db85268ff7e63cc81dada796dad51e0
            • Instruction Fuzzy Hash: C1817371A003119FE760EF25C846F6AB7E6BF48720F14881EF995DB392DB74AC408B55
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
            • String ID:
            • API String ID: 1559183368-0
            • Opcode ID: 17c9c7776e299596ed796557eca7f8bd29831e9b0e98da48d3161094909ff33f
            • Instruction ID: e2934eb40a44798a23bc962b2d1633436dc06d6b40a2bc12baa3147943b456d0
            • Opcode Fuzzy Hash: 17c9c7776e299596ed796557eca7f8bd29831e9b0e98da48d3161094909ff33f
            • Instruction Fuzzy Hash: 85519F30A00A0DDBDB249F79C8856BE77A7AF41320F248729EB36962E0D7719D518B50
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 00750EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0074FE38,?,?), ref: 00750EBC
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00750188
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007501C7
            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0075020E
            • RegCloseKey.ADVAPI32(?,?), ref: 0075023A
            • RegCloseKey.ADVAPI32(00000000), ref: 00750247
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
            • String ID:
            • API String ID: 3440857362-0
            • Opcode ID: e1d303ff26b7e788a8cd6d3c2482c5c81ed7068891e154af646a50847c34e24b
            • Instruction ID: b55df5fb46e08e118defb233e342755b09cc3f793bd8df17318f408e5ca647ca
            • Opcode Fuzzy Hash: e1d303ff26b7e788a8cd6d3c2482c5c81ed7068891e154af646a50847c34e24b
            • Instruction Fuzzy Hash: 8A516B31608204AFD704EF64DC85EAEB7E9FF84705F04882EF99587291DB74E908CB96
            APIs
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0074DA3B
            • GetProcAddress.KERNEL32(00000000,?), ref: 0074DABE
            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0074DADA
            • GetProcAddress.KERNEL32(00000000,?), ref: 0074DB1B
            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0074DB35
              • Part of subcall function 006D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0073793F,?,?,00000000), ref: 006D5B8C
              • Part of subcall function 006D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0073793F,?,?,00000000,?,?), ref: 006D5BB0
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
            • String ID:
            • API String ID: 327935632-0
            • Opcode ID: ee36e3d7acbec9e35831f3478472a2710eb3d7006b0635128a8efbffec3f627d
            • Instruction ID: b8f167d9cdb58b66b42dc4c642e48081aebcc6fd0655648b160fb5107ba1ca1e
            • Opcode Fuzzy Hash: ee36e3d7acbec9e35831f3478472a2710eb3d7006b0635128a8efbffec3f627d
            • Instruction Fuzzy Hash: F3512775A00609EFCB10EFA8C4949ADB7F5FF48310B09C06AE85AAB311DB34AD45CB95
            APIs
            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0073E6AB
            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0073E6D4
            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0073E713
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0073E738
            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0073E740
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
            • String ID:
            • API String ID: 1389676194-0
            • Opcode ID: 05cc3798a92006311e4dc3d42cce383cff91927869cea3373c1dbae8a1c26b57
            • Instruction ID: a7a5c08905676c4dbd5eb5cebc86c853044479685fe60628a7aa60fc3c67cf82
            • Opcode Fuzzy Hash: 05cc3798a92006311e4dc3d42cce383cff91927869cea3373c1dbae8a1c26b57
            • Instruction Fuzzy Hash: 62512D75A00215EFDB41EF64C9819ADBBF5FF08314F148099E849AB362CB35ED11DB64
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2fb2029432feff98e7401cc5fece161677831457c9760bc16271b96de241659e
            • Instruction ID: c21487885b3c22264bf2eba494a461c444df8ae880def506f250d2b72c54b5a9
            • Opcode Fuzzy Hash: 2fb2029432feff98e7401cc5fece161677831457c9760bc16271b96de241659e
            • Instruction Fuzzy Hash: 3441D035900A18BBD710DF28DC44FE9BBB4EB09362F154275EC16A72E0D7B89E058B91
            APIs
            • GetCursorPos.USER32(?), ref: 006D2357
            • ScreenToClient.USER32(007957B0,?), ref: 006D2374
            • GetAsyncKeyState.USER32(00000001), ref: 006D2399
            • GetAsyncKeyState.USER32(00000002), ref: 006D23A7
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorScreen
            • String ID:
            • API String ID: 4210589936-0
            • Opcode ID: daaceaad6346eead81752b355b49bf0acda80aa5c401835b9c707b193eabec7b
            • Instruction ID: 9fc702f7c33adf40f160034e40d033ecaaaf748f894e7fece563db029a39697f
            • Opcode Fuzzy Hash: daaceaad6346eead81752b355b49bf0acda80aa5c401835b9c707b193eabec7b
            • Instruction Fuzzy Hash: 6341917590811AFBCF169F68C844AEDBBB5FB05320F20436AF828922D1C7786D54DF91
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0072673D
            • TranslateAcceleratorW.USER32(?,?,?), ref: 00726789
            • TranslateMessage.USER32(?), ref: 007267B2
            • DispatchMessageW.USER32(?), ref: 007267BC
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007267CB
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Message$PeekTranslate$AcceleratorDispatch
            • String ID:
            • API String ID: 2108273632-0
            • Opcode ID: f6d4906df7815d268326d5ca492b56a5e29ce8aa54ef05aff2f35ab0095e35bc
            • Instruction ID: 6152618e5109a9fd2925e71bc617dd8e57c0b107f00b13fc745e47c42c69b264
            • Opcode Fuzzy Hash: f6d4906df7815d268326d5ca492b56a5e29ce8aa54ef05aff2f35ab0095e35bc
            • Instruction Fuzzy Hash: 5A31D070901666AFDB21CBB0BC84FB67BE8AB01308F14816BE521C32A1E76D9586D794
            APIs
            • GetWindowRect.USER32(?,?), ref: 00728CF2
            • PostMessageW.USER32(?,00000201,00000001), ref: 00728D9C
            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00728DA4
            • PostMessageW.USER32(?,00000202,00000000), ref: 00728DB2
            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00728DBA
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessagePostSleep$RectWindow
            • String ID:
            • API String ID: 3382505437-0
            • Opcode ID: aa040d95bed1eae9e68e995e13fe1206f14d45137488e77127561cc0bfbe0f7b
            • Instruction ID: fe9b5986de46e6de97c93774e5ea5efe2446100961d179e4bad8fe7c9903f9e4
            • Opcode Fuzzy Hash: aa040d95bed1eae9e68e995e13fe1206f14d45137488e77127561cc0bfbe0f7b
            • Instruction Fuzzy Hash: C431E071601229EBDF00CF68E94CADE3BB5EB18316F108229F924E71D0C7B99918CB91
            APIs
            • IsWindowVisible.USER32(?), ref: 0072B4C6
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0072B4E3
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0072B51B
            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0072B541
            • _wcsstr.LIBCMT ref: 0072B54B
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
            • String ID:
            • API String ID: 3902887630-0
            • Opcode ID: c840079098fbdd5ec0f593dbf156a7b53e60af6715ec1bc1d93ab8febacd1efe
            • Instruction ID: 6ed70ada77df52f7cce539ac64daafac656a8785a3a6a0bd21a03f067346b1a3
            • Opcode Fuzzy Hash: c840079098fbdd5ec0f593dbf156a7b53e60af6715ec1bc1d93ab8febacd1efe
            • Instruction Fuzzy Hash: C8214C31604214BAFB255B39AC45E7B7BA9DF48750F10803DFD05CE161EFA9DC5093A0
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • GetWindowLongW.USER32(?,000000F0), ref: 0075B1C6
            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0075B1EB
            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0075B203
            • GetSystemMetrics.USER32(00000004), ref: 0075B22C
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00740FA5,00000000), ref: 0075B24A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$Long$MetricsSystem
            • String ID:
            • API String ID: 2294984445-0
            • Opcode ID: 276ee6c3c49f07390d5671603cc7f4c1285e2293fddbd361013f491ad671ac8b
            • Instruction ID: 32b9c04c5189ea552efbcfe133a3523d0d0246b6d282f85c8f991b95258d25da
            • Opcode Fuzzy Hash: 276ee6c3c49f07390d5671603cc7f4c1285e2293fddbd361013f491ad671ac8b
            • Instruction Fuzzy Hash: 35219131914625AFCB109F398C48BBA37A4FB45322F108739FD22D71E0E7789819CBA0
            APIs
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007295E2
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00729614
            • __itow.LIBCMT ref: 0072962C
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00729654
            • __itow.LIBCMT ref: 00729665
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$__itow$_memmove
            • String ID:
            • API String ID: 2983881199-0
            • Opcode ID: 2dd4a4013844d174996fedc20935abd563e98b6bcd07d29d8016422a35ce0116
            • Instruction ID: 2c0e293969df8a823066d5329f655f2c77dd169b12234e610b15252bef01dd93
            • Opcode Fuzzy Hash: 2dd4a4013844d174996fedc20935abd563e98b6bcd07d29d8016422a35ce0116
            • Instruction Fuzzy Hash: 85212931B00228BBEB20AB60DC89EEE7BE9EF49710F084029FF04D7240E6748D45C796
            APIs
            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006D134D
            • SelectObject.GDI32(?,00000000), ref: 006D135C
            • BeginPath.GDI32(?), ref: 006D1373
            • SelectObject.GDI32(?,00000000), ref: 006D139C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ObjectSelect$BeginCreatePath
            • String ID:
            • API String ID: 3225163088-0
            • Opcode ID: 3243d76ab504ab05e81182a86233bad759cdb539f45826627819ac5a92569c5a
            • Instruction ID: 382cec2857be3a314b49ab35635b65771fe32f8cdb81844fe1e80622935831ec
            • Opcode Fuzzy Hash: 3243d76ab504ab05e81182a86233bad759cdb539f45826627819ac5a92569c5a
            • Instruction Fuzzy Hash: 29215330C01718EBDB119F15DC04B997BA5EB11321F148217F4149A3A0D7B99992DF54
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00734B61
            • __beginthreadex.LIBCMT ref: 00734B7F
            • MessageBoxW.USER32(?,?,?,?), ref: 00734B94
            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00734BAA
            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00734BB1
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
            • String ID:
            • API String ID: 3824534824-0
            • Opcode ID: f50a16f509403166608cb57726d359572a742c417a0ba46000d7e8305eeb264d
            • Instruction ID: e8b2059798a73c221b9e8ffa66fddc2c1b7b0134b4db1c4092caf329783c91d3
            • Opcode Fuzzy Hash: f50a16f509403166608cb57726d359572a742c417a0ba46000d7e8305eeb264d
            • Instruction Fuzzy Hash: 331144F2904658BBD7119FA89C04ADBBFACEB49321F14826AF814D3252D6B9CD0087A4
            APIs
            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00728546
            • GetLastError.KERNEL32(?,0072800A,?,?,?), ref: 00728550
            • GetProcessHeap.KERNEL32(00000008,?,?,0072800A,?,?,?), ref: 0072855F
            • HeapAlloc.KERNEL32(00000000,?,0072800A,?,?,?), ref: 00728566
            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0072857D
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
            • String ID:
            • API String ID: 842720411-0
            • Opcode ID: 82d1e9366115ee02988fac1e2bf5571702b2b10d2d19007d84d4702b220f1f5a
            • Instruction ID: 8d8b82fdc4ff717d4a06391fc3afc4aa57cb1203df29781e83a6bbfd2b8e3a92
            • Opcode Fuzzy Hash: 82d1e9366115ee02988fac1e2bf5571702b2b10d2d19007d84d4702b220f1f5a
            • Instruction Fuzzy Hash: 3A016271601314FFDB114FA6EC48DAB7F6CFF45356B144569F809C3120DA768D50CA61
            APIs
            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00735307
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00735315
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 0073531D
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00735327
            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00735363
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: dcb1a2b2f0c5c2784f4ce605efb849aae757ac6c0c2f2ece59356bee00dfb571
            • Instruction ID: 95a57d0d4c609f728dccbb39e902d4f653a664992bc05c9a5658afff13513837
            • Opcode Fuzzy Hash: dcb1a2b2f0c5c2784f4ce605efb849aae757ac6c0c2f2ece59356bee00dfb571
            • Instruction Fuzzy Hash: E0018031C05A1DDBDF00AFE4EC8C5EDBB78FB08751F054559E941F2141CBB85A5087A5
            APIs
            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?,?,?,0072777D), ref: 0072744F
            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?,?), ref: 0072746A
            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?,?), ref: 00727478
            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?), ref: 00727488
            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0072736C,80070057,?,?), ref: 00727494
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: From$Prog$FreeStringTasklstrcmpi
            • String ID:
            • API String ID: 3897988419-0
            • Opcode ID: 48723f8d69e89190a355cb0d3275bf136ecdef31838261314c49e29f2a1c1115
            • Instruction ID: a57726654ae8c4ccd656b422343bde8d2843ce3f1bdfee87d95ba45280afb7fa
            • Opcode Fuzzy Hash: 48723f8d69e89190a355cb0d3275bf136ecdef31838261314c49e29f2a1c1115
            • Instruction Fuzzy Hash: 4D017172601328FBDB146F64ED44AAA7FADEB44762F148024F908D3220D779EE40DBA0
            APIs
            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007283E8
            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007283F2
            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00728401
            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00728408
            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0072841E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: 205c47589395f84b22d4c9e54abfd369eccbb1f1555447ecdf1235f129336611
            • Instruction ID: 46d469c838d3a29d5ac5b72ebec57a171b40c30b6135d24434a78d9f47c35877
            • Opcode Fuzzy Hash: 205c47589395f84b22d4c9e54abfd369eccbb1f1555447ecdf1235f129336611
            • Instruction Fuzzy Hash: E1F0C230206355EFEB102FB4EC8CEAB3BACEF89755B004025F909C3190CBB99C41DA61
            APIs
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00728449
            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00728453
            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00728462
            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00728469
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0072847F
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: fddd51d6503b09902a8eee3b2317c3228d55066607950f12cd696d0f49c1ff06
            • Instruction ID: a2b63bbc08124c8aeb2f7322247a2d156c479400cb5922ffc2ec0a251aca16a0
            • Opcode Fuzzy Hash: fddd51d6503b09902a8eee3b2317c3228d55066607950f12cd696d0f49c1ff06
            • Instruction Fuzzy Hash: E0F0C230202355AFEB512FA4EC8CEAB3FACEF49756F084025F909C3190CBA99D00DA61
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 0072C4B9
            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0072C4D0
            • MessageBeep.USER32(00000000), ref: 0072C4E8
            • KillTimer.USER32(?,0000040A), ref: 0072C504
            • EndDialog.USER32(?,00000001), ref: 0072C51E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: 53383ea46a7d4ee4c2c7f14da5163e3c6bdd879522ccd8ee12a766caa775b754
            • Instruction ID: 44a4a03f8ea0b3d19bbfa4f53df7dd3159255ac0e94fe5e633f0022f27b90ba8
            • Opcode Fuzzy Hash: 53383ea46a7d4ee4c2c7f14da5163e3c6bdd879522ccd8ee12a766caa775b754
            • Instruction Fuzzy Hash: CA016230540714ABEB216B20ED5EFAA7BBCFF14706F004669F582A10E1DBE8B9548A85
            APIs
            • EndPath.GDI32(?), ref: 006D13BF
            • StrokeAndFillPath.GDI32(?,?,0070BA08,00000000,?), ref: 006D13DB
            • SelectObject.GDI32(?,00000000), ref: 006D13EE
            • DeleteObject.GDI32 ref: 006D1401
            • StrokePath.GDI32(?), ref: 006D141C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Path$ObjectStroke$DeleteFillSelect
            • String ID:
            • API String ID: 2625713937-0
            • Opcode ID: 4e11b8957df54b4ba29d51766c70ccd50079bab2ad71181e80a98e7b8cb5ba42
            • Instruction ID: ae0675690c8f259ec5990dd093d77435eabf96be5f118b276748ee50a121edb3
            • Opcode Fuzzy Hash: 4e11b8957df54b4ba29d51766c70ccd50079bab2ad71181e80a98e7b8cb5ba42
            • Instruction Fuzzy Hash: 9AF0E130405B18EBDB125F16EC4CB983FE5A701326F08C326E429892F1C7B949A6DF58
            APIs
              • Part of subcall function 006F0F36: std::exception::exception.LIBCMT ref: 006F0F6C
              • Part of subcall function 006F0F36: __CxxThrowException@8.LIBCMT ref: 006F0F81
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 006D7BB1: _memmove.LIBCMT ref: 006D7C0B
            • __swprintf.LIBCMT ref: 006E302D
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 006E2EC6
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 1943609520-557222456
            • Opcode ID: 679a78f718bb8ef29be447d0656421a8eda7197587b75dd8feb6f5e90d2ce67b
            • Instruction ID: b51db8ffa49914a1c7ebd06ce2835c18e618c198bf9a495865f232400667f6e5
            • Opcode Fuzzy Hash: 679a78f718bb8ef29be447d0656421a8eda7197587b75dd8feb6f5e90d2ce67b
            • Instruction Fuzzy Hash: 31918E715093519FC754EF28C895CAEB7A6EF85700F04491EF8829B3A1EB30EE45CB56
            APIs
              • Part of subcall function 006D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006D48A1,?,?,006D37C0,?), ref: 006D48CE
            • CoInitialize.OLE32(00000000), ref: 0073BA47
            • CoCreateInstance.OLE32(00762D6C,00000000,00000001,00762BDC,?), ref: 0073BA60
            • CoUninitialize.OLE32 ref: 0073BA7D
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
            • String ID: .lnk
            • API String ID: 2126378814-24824748
            • Opcode ID: f8ce270106d25e742e1350e859739727ed99ada4041966a8f4a9adf79aac76e0
            • Instruction ID: 4a7fe33e1648d9d587bc1b2b067b5ceaa771989159ae501bc2d067e9f3c00423
            • Opcode Fuzzy Hash: f8ce270106d25e742e1350e859739727ed99ada4041966a8f4a9adf79aac76e0
            • Instruction Fuzzy Hash: A3A13375604301AFDB10DF14C494E6ABBE6BF88314F04898DF99A9B3A2CB35EC45CB91
            APIs
            • OleSetContainedObject.OLE32(?,00000001), ref: 0072B780
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ContainedObject
            • String ID: AutoIt3GUI$Container$%v
            • API String ID: 3565006973-1258757215
            • Opcode ID: 393c1ca29185e472bef4c6c5e300764f3752f7692423beec092956ccd90cef93
            • Instruction ID: 13a4478f7c12281aa411bf03aeb4f1ede7902f7e31106c8bd620f779199e6c93
            • Opcode Fuzzy Hash: 393c1ca29185e472bef4c6c5e300764f3752f7692423beec092956ccd90cef93
            • Instruction Fuzzy Hash: E19149B0600611AFDB54DF64D884B66BBF9FF48710F24856EF90ACB691DBB4E841CB90
            APIs
            • __startOneArgErrorHandling.LIBCMT ref: 006F521D
              • Part of subcall function 00700270: __87except.LIBCMT ref: 007002AB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorHandling__87except__start
            • String ID: pow
            • API String ID: 2905807303-2276729525
            • Opcode ID: 739f2947a2d909e7ae9ca0b6c67dd7bf90714e26582c1e16398d490fd3631708
            • Instruction ID: 802863471388bbd9e59b4afd6477de13609a2138c921377de75d1db2b2e5e5bf
            • Opcode Fuzzy Hash: 739f2947a2d909e7ae9ca0b6c67dd7bf90714e26582c1e16398d490fd3631708
            • Instruction Fuzzy Hash: F7517C21A0CA09C7DB11A718C8453BE6BD5EB40760F208F5DF297822E5EF3C8DC596CA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID: #$+
            • API String ID: 0-2552117581
            • Opcode ID: 8c5eb342829cc265d2651326f4ed9af14e3b4d498c1c95bb1174773cea7b6076
            • Instruction ID: 615de267f257f59ae20fd34d2f5af9a4312977c81acedbe0a663d70b1785551f
            • Opcode Fuzzy Hash: 8c5eb342829cc265d2651326f4ed9af14e3b4d498c1c95bb1174773cea7b6076
            • Instruction Fuzzy Hash: C75131B550422A9FDF25DF28D484AFABBA5EF19310F18405AFC819B3A1D7389D42CB60
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove$_free
            • String ID: Oan
            • API String ID: 2620147621-1382745430
            • Opcode ID: 8a984d74634c465774eed5a7bffb10a4f47d698cb30bcf25a78ee586faf020e2
            • Instruction ID: 2b4fb27554039a3a470ba0b20763fb6b5cb528c412d7fa73b32e9d6eb2959671
            • Opcode Fuzzy Hash: 8a984d74634c465774eed5a7bffb10a4f47d698cb30bcf25a78ee586faf020e2
            • Instruction Fuzzy Hash: DB516C716093919FDB64CF29C885B6ABBE2FF85314F04892DE98987351DB31DA41CB42
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memset$_memmove
            • String ID: ERCP
            • API String ID: 2532777613-1384759551
            • Opcode ID: 333fcea0042efa87ad0f5fc7c33ddc4ea850f82fe77e74beefc51701d0ad7a75
            • Instruction ID: f759a4c2bb132f262766d63caf0ac9fc47da414b327e932fc5a87bc5053ae1ac
            • Opcode Fuzzy Hash: 333fcea0042efa87ad0f5fc7c33ddc4ea850f82fe77e74beefc51701d0ad7a75
            • Instruction Fuzzy Hash: D351C171901359DBDB24CF56C8817EAB7F5FF14344F20856EE94ACB281E374AA80CB80
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0075F910,00000000,?,?,?,?), ref: 00757A11
            • GetWindowLongW.USER32 ref: 00757A2E
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00757A3E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: b51e59f0581a4ace5fdd6d85643b0672b995664a8606f01c7a33633f0821c0c6
            • Instruction ID: c11ab5f3123fbdeba674cd30ccd9bbd224185d3bfebc0407289fd910a749d726
            • Opcode Fuzzy Hash: b51e59f0581a4ace5fdd6d85643b0672b995664a8606f01c7a33633f0821c0c6
            • Instruction Fuzzy Hash: 0231FE71204606ABDB158E38DC41BEA7BA9EF04325F208725F875932E0C7B8E955CB60
            APIs
            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00757493
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007574A7
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 007574CB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: SysMonthCal32
            • API String ID: 2326795674-1439706946
            • Opcode ID: 686ca15ab9f81e73ffb590968de253424d5f994d0274cebaabe731a34b62cc7b
            • Instruction ID: b242428fabd374ba38a3a1995786f2d275c96b4277d52e7a5dd6a5983658c133
            • Opcode Fuzzy Hash: 686ca15ab9f81e73ffb590968de253424d5f994d0274cebaabe731a34b62cc7b
            • Instruction Fuzzy Hash: 9F21E232500218BFDF258F90DC46FEA3B79EF48724F110214FE146B1D0D6B9A855CBA0
            APIs
            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00756D6D
            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00756D7D
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00756DA2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend$MoveWindow
            • String ID: Listbox
            • API String ID: 3315199576-2633736733
            • Opcode ID: 1f7369e423086149aa397b056e348bae848a08ca26b6caa0f48cba443da0bd65
            • Instruction ID: ee885241b7ef833f9c60bd3c4eaf07340873d37e50de5a7c9a13fd442723ed2f
            • Opcode Fuzzy Hash: 1f7369e423086149aa397b056e348bae848a08ca26b6caa0f48cba443da0bd65
            • Instruction Fuzzy Hash: 7521F532700218BFEF118F54DC84EFB3BBAEF89751F408524F9009B190C6B5AC5687A0
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007577A4
            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007577B9
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007577C6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: 79f409e1cd612cb5630807893983246fe9d26a2ba1f316f8c755a603c34bd1b1
            • Instruction ID: 55ce27791cc3a151c12fce1ae7831793ad960d171fa2c63523a4b54f23086e04
            • Opcode Fuzzy Hash: 79f409e1cd612cb5630807893983246fe9d26a2ba1f316f8c755a603c34bd1b1
            • Instruction Fuzzy Hash: 0611C172244208BAEB145F60EC45FEB7BA9EF89B25F014518FA41A60A0D6B6A811CB24
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __calloc_crt
            • String ID: x$@By
            • API String ID: 3494438863-866083994
            • Opcode ID: 7a23be47e023639209e4d80faf963618d665f2d8c3ffa254b891bf96b381b6cb
            • Instruction ID: 1f948000518843321af7ee010f717436e7c585f2d9779b5b76e689b8b1c54f1a
            • Opcode Fuzzy Hash: 7a23be47e023639209e4d80faf963618d665f2d8c3ffa254b891bf96b381b6cb
            • Instruction Fuzzy Hash: 96F062B1348B2A9AF7659F19FD126B12796FF51720B10452BF314CE294E77888824798
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,006D4C2E), ref: 006D4CA3
            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 006D4CB5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 2574300362-192647395
            • Opcode ID: 574e90c62c8d1ec3aaa4a224a177882089b930c532c3a15d3dcfe5485467f52b
            • Instruction ID: 5d074fe12d92d0228ecf64f0f1340fe8e1c8826378c1f7b984dcf2d9bd0bd608
            • Opcode Fuzzy Hash: 574e90c62c8d1ec3aaa4a224a177882089b930c532c3a15d3dcfe5485467f52b
            • Instruction Fuzzy Hash: 9AD012B0911B27CFD7205F31DA18A8676D6AF05752B11C83AD885D6250EAB8D880C651
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,006D4D2E,?,006D4F4F,?,007952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 006D4D6F
            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 006D4D81
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-3689287502
            • Opcode ID: 5e7f038a716e8a3442696ee34195a42a6aa8503aa22641b863f519e438a5b731
            • Instruction ID: 7cc4952e8ed154a46125b8dbd51d03e3661faa6fa0ea74b0551ed5ff4df875bf
            • Opcode Fuzzy Hash: 5e7f038a716e8a3442696ee34195a42a6aa8503aa22641b863f519e438a5b731
            • Instruction Fuzzy Hash: C4D01270910B13CFD7205F31D80869676DBAF15352B11C83AD486D6750EBB8D880CB61
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,006D4CE1,?), ref: 006D4DA2
            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 006D4DB4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-1355242751
            • Opcode ID: 83fd88367ac766fcddf48b8b83a8afa6d858f195b8dfbeb4b091e6e25e3dda52
            • Instruction ID: 63994ca578af2f0e7a232faf296d346a55fc22a9ac5fec0f98f75322ce7728f9
            • Opcode Fuzzy Hash: 83fd88367ac766fcddf48b8b83a8afa6d858f195b8dfbeb4b091e6e25e3dda52
            • Instruction Fuzzy Hash: 90D012B0950B13CFD7205F31D808AC676E7AF05356B11C83AD8C5D6650EBB8D880C650
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll,?,007510C1), ref: 00750E80
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00750E92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll
            • API String ID: 2574300362-4033151799
            • Opcode ID: e60330d8fa387b82a06ba2cec0ab85522bd4345d0aeb74357de2fb3e486c5b15
            • Instruction ID: f991bb0e6fb2621aa71842b35f8384248478ff2f5ae591d51831003248823265
            • Opcode Fuzzy Hash: e60330d8fa387b82a06ba2cec0ab85522bd4345d0aeb74357de2fb3e486c5b15
            • Instruction Fuzzy Hash: 81D01270550713CFD7206F35D9095D676D4AF04393B15CC39E985D2190D7B8C480C790
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00748E09,?,0075F910), ref: 00749203
            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00749215
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetModuleHandleExW$kernel32.dll
            • API String ID: 2574300362-199464113
            • Opcode ID: c5c105d2d4bbb415d2cbed4d1018d0ae7904f8eb950492b46d35de05a5afbce8
            • Instruction ID: 9353afb18c233f190c5d7514e823b9f1f06eae1ebd1103b69ee505f3fd78b9ef
            • Opcode Fuzzy Hash: c5c105d2d4bbb415d2cbed4d1018d0ae7904f8eb950492b46d35de05a5afbce8
            • Instruction Fuzzy Hash: 0AD0E2B0594B16DFDB20AB31DD0968676E6AF05352B11C83AD986D6590EBB8C880CA91
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: LocalTime__swprintf
            • String ID: %.3d$WIN_XPe
            • API String ID: 2070861257-2409531811
            • Opcode ID: 8d81756f1f0f0f1b7cc2abce1a9e5bf60820abeddc7606eb7941eb9cd31ffe5a
            • Instruction ID: e8b601c0cad7e2b38d4c18768e817c051e2a38b51c84cdcb4a175615199b267a
            • Opcode Fuzzy Hash: 8d81756f1f0f0f1b7cc2abce1a9e5bf60820abeddc7606eb7941eb9cd31ffe5a
            • Instruction Fuzzy Hash: 7ED012B1C4511DEACB4097D48C859FE777CAF08310F94C052F602A5180E26DDBC4DB25
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9b8fc58db09e5be44f66712eb11a7a41717349f40278a7f87023e8507b409b32
            • Instruction ID: e6dd1b6c48d6328f9be8df1401709030722e656bd7865a3802576390b0115ec7
            • Opcode Fuzzy Hash: 9b8fc58db09e5be44f66712eb11a7a41717349f40278a7f87023e8507b409b32
            • Instruction Fuzzy Hash: 2DC15E74A04226EFCB18CF98D984EAEB7B5FF48714B218598E805EB351D734ED81DB90
            APIs
            • CharLowerBuffW.USER32(?,?), ref: 0074E1D2
            • CharLowerBuffW.USER32(?,?), ref: 0074E215
              • Part of subcall function 0074D8B9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0074D8D9
            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0074E415
            • _memmove.LIBCMT ref: 0074E428
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: BuffCharLower$AllocVirtual_memmove
            • String ID:
            • API String ID: 3659485706-0
            • Opcode ID: 8b72cd871ad16d50b2527ef4c7acbe9db3fecbc5df733ccbecda73b0b677042a
            • Instruction ID: b6b459d37439e4941388118e161a17361ab9dcbfe41c4a17e51ebe96ac6235d8
            • Opcode Fuzzy Hash: 8b72cd871ad16d50b2527ef4c7acbe9db3fecbc5df733ccbecda73b0b677042a
            • Instruction Fuzzy Hash: 57C17A71A08311DFC754DF28C48096ABBE5FF88324F04896EF8999B352D774E945CB82
            APIs
            • CoInitialize.OLE32(00000000), ref: 007481D8
            • CoUninitialize.OLE32 ref: 007481E3
              • Part of subcall function 0072D87B: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0072D8E3
            • VariantInit.OLEAUT32(?), ref: 007481EE
            • VariantClear.OLEAUT32(?), ref: 007484BF
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
            • String ID:
            • API String ID: 780911581-0
            • Opcode ID: 75266b7dbf0e4a7e28feec099b029dac3b6cc31c6ffd6db7a55492e8ef6e028a
            • Instruction ID: 245ad930010cae4bbdbcd7c24cd67a993e1f96df75f1b3b6cf6594b7252e17fe
            • Opcode Fuzzy Hash: 75266b7dbf0e4a7e28feec099b029dac3b6cc31c6ffd6db7a55492e8ef6e028a
            • Instruction Fuzzy Hash: DDA146756047059FDB90DF18C491A2EB7E5BF88724F08844DF99A9B3A2CB38ED00CB56
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Variant$AllocClearCopyInitString
            • String ID:
            • API String ID: 2808897238-0
            • Opcode ID: 1f3b764a69ae7f5a0d4e2c138bf2650fd7198f74f40aa28382d314c9f3e69872
            • Instruction ID: 04fe5d31fc53d88778b2a22d0e406a37cae5988222470b4475c271c3a0b83398
            • Opcode Fuzzy Hash: 1f3b764a69ae7f5a0d4e2c138bf2650fd7198f74f40aa28382d314c9f3e69872
            • Instruction Fuzzy Hash: FE51C63070431ADBDF64AF65E895A79B3E5EF48310F20882FE596CB2D1DB789880CB15
            APIs
            • GetWindowRect.USER32(0101F538,?), ref: 00759895
            • ScreenToClient.USER32(00000002,00000002), ref: 007598C8
            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00759935
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$ClientMoveRectScreen
            • String ID:
            • API String ID: 3880355969-0
            • Opcode ID: cda3c293edfdaa1b37d6c2588829c0663a83c6c101188ef3f779e4ca3349c6aa
            • Instruction ID: 7a134373baf7851b4e886bae7237c79f7c5bf1a0ed71fdca7eb1ccbdca8ef8f9
            • Opcode Fuzzy Hash: cda3c293edfdaa1b37d6c2588829c0663a83c6c101188ef3f779e4ca3349c6aa
            • Instruction Fuzzy Hash: 20514934A00209EFCF10DF64D880AEE7BB6EF85321F148169FD559B2A0D7B5AD85CB90
            APIs
            • socket.WSOCK32(00000002,00000002,00000011), ref: 00746AE7
            • WSAGetLastError.WSOCK32(00000000), ref: 00746AF7
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00746B5B
            • WSAGetLastError.WSOCK32(00000000), ref: 00746B67
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ErrorLast$__itow__swprintfsocket
            • String ID:
            • API String ID: 2214342067-0
            • Opcode ID: b68be163098ac14d80d45e61cc0772ea22770e6fb577ffd151e6618ede81829e
            • Instruction ID: 0c24b1ed56d2b758c1794d599385360f3a8bdca6404ac536b1327fee57ff3df3
            • Opcode Fuzzy Hash: b68be163098ac14d80d45e61cc0772ea22770e6fb577ffd151e6618ede81829e
            • Instruction Fuzzy Hash: 7741C375B40210AFEB60AF24DC86F7A77EADB04B10F54841DFA199B3C2DB749C008B99
            APIs
            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0075F910), ref: 007465BD
            • _strlen.LIBCMT ref: 007465EF
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _strlen
            • String ID:
            • API String ID: 4218353326-0
            • Opcode ID: b0c05b0f3b5f90a635a541352a54e5d17c8e39fda6d1223e70b9ddf28a6140bb
            • Instruction ID: 8189da308721cbe38677abe1a29c2f1ec05a5a39ee10427c508a4c0484cf8c95
            • Opcode Fuzzy Hash: b0c05b0f3b5f90a635a541352a54e5d17c8e39fda6d1223e70b9ddf28a6140bb
            • Instruction Fuzzy Hash: A441C431A00104AFCB14FB64ECD5EBEB3AAEF44310F15815AF81697392EB34AD00CB56
            APIs
            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0073B92A
            • GetLastError.KERNEL32(?,00000000), ref: 0073B950
            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0073B975
            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0073B9A1
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: 2815dc51ab5d43ab674baf418caf4e1be4555529c37c3cd266dc551995ed9921
            • Instruction ID: f668ece2f58329b625130a018abcb4463fdf816d10c414f58d5931bf35d88132
            • Opcode Fuzzy Hash: 2815dc51ab5d43ab674baf418caf4e1be4555529c37c3cd266dc551995ed9921
            • Instruction Fuzzy Hash: 10411639A00610EFCB10EF15C495A59BBE2AF89314F098089E94A9F762CB34FD00CBA5
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00758910
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: 77ce01da17b0ba0fe9cca8a9e1595404e88a21e49cc3c4f6fd305b033661f24d
            • Instruction ID: 3a1e5ab8d5d3e263e6dcdc7d8621399d1c8a1be594ac6155f644f356e198a68e
            • Opcode Fuzzy Hash: 77ce01da17b0ba0fe9cca8a9e1595404e88a21e49cc3c4f6fd305b033661f24d
            • Instruction Fuzzy Hash: B831C134605108BFEFA19A54CC45BF83765EB05322F544116FE51F62E0CFB8B9889B93
            APIs
            • ClientToScreen.USER32(?,?), ref: 0075AB92
            • GetWindowRect.USER32(?,?), ref: 0075AC08
            • PtInRect.USER32(?,?,0075C07E), ref: 0075AC18
            • MessageBeep.USER32(00000000), ref: 0075AC89
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: b308ede8a33a9d069e521ae335cd972216c71bf25035e49c685d2da4469913cf
            • Instruction ID: eebdba97a5c852f1a137790091e9b95ae30168ef3fdb02d480ed83151aebea09
            • Opcode Fuzzy Hash: b308ede8a33a9d069e521ae335cd972216c71bf25035e49c685d2da4469913cf
            • Instruction Fuzzy Hash: A1416170600215EFCF12CF58C884EE977F5FB49312F1482B9E9159B261D779A849CB62
            APIs
            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00730E58
            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00730E74
            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00730EDA
            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00730F2C
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: d0bf04550eacdf42034e9c35b89e0807ae7ba6dcb1f65df4a711413fd07e6b7b
            • Instruction ID: c378ef714ded273c82e44f0fdde54e50f2519a36fa53955c4076438a89ddbd03
            • Opcode Fuzzy Hash: d0bf04550eacdf42034e9c35b89e0807ae7ba6dcb1f65df4a711413fd07e6b7b
            • Instruction Fuzzy Hash: 8A314870B80218AEFB34DB248C29BFE7B65EB48310F18465AF0D0521D3D37D895597D5
            APIs
            • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 00730F97
            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00730FB3
            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00731012
            • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 00731064
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: 9a5d5e8ab774bebaa0ff43c521a5d785ccb5e66c2cd36b03718bf5134836f85c
            • Instruction ID: 748457e2cb426e5de72cd14bcc2a5a78b70188a67ec9d9268eb355080e634616
            • Opcode Fuzzy Hash: 9a5d5e8ab774bebaa0ff43c521a5d785ccb5e66c2cd36b03718bf5134836f85c
            • Instruction Fuzzy Hash: 2D313A30A40398DEFF388A648818BFABB65AB45311F44421AE495521D3D37D89D197A2
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0070637B
            • __isleadbyte_l.LIBCMT ref: 007063A9
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 007063D7
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0070640D
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: ab14775d657252236233f89dcd3217fcb9fa4b539c0738b7286e1c4e8564cbce
            • Instruction ID: 425de17adea1cac8f25d8ec32f65460d14637d255c8f53c7fb9b865a43695c1f
            • Opcode Fuzzy Hash: ab14775d657252236233f89dcd3217fcb9fa4b539c0738b7286e1c4e8564cbce
            • Instruction Fuzzy Hash: 0731903160029AEFDB218F65C854BBABBF6FF41310F158229F8548B1D1E739D960DB90
            APIs
            • GetForegroundWindow.USER32 ref: 00754F6B
              • Part of subcall function 00733685: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0073369F
              • Part of subcall function 00733685: GetCurrentThreadId.KERNEL32 ref: 007336A6
              • Part of subcall function 00733685: AttachThreadInput.USER32(00000000,?,007350AC), ref: 007336AD
            • GetCaretPos.USER32(?), ref: 00754F7C
            • ClientToScreen.USER32(00000000,?), ref: 00754FB7
            • GetForegroundWindow.USER32 ref: 00754FBD
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: 0b9f177d3fdcc480f8ab5803f00305ca9683a470fc3766b43bb23d864fcee966
            • Instruction ID: 7dec911ef66a3c6cd63edde11debeabd490debc80a58da5a6c7c205df10abbca
            • Opcode Fuzzy Hash: 0b9f177d3fdcc480f8ab5803f00305ca9683a470fc3766b43bb23d864fcee966
            • Instruction Fuzzy Hash: EB312F72D00118AFDB50EFA5C845AEFB7F9EF98304F10406AE505E7341EA755E45CBA4
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • GetCursorPos.USER32(?), ref: 0075C53C
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0070BB2B,?,?,?,?,?), ref: 0075C551
            • GetCursorPos.USER32(?), ref: 0075C59E
            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0070BB2B,?,?,?), ref: 0075C5D8
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Cursor$LongMenuPopupProcTrackWindow
            • String ID:
            • API String ID: 2864067406-0
            • Opcode ID: ad2ff8a9c4b2a71be4e71311d4824f001c15e39263aa1094f74d6bbecebd3296
            • Instruction ID: 7d8fd7199d6a8c3c1e81583a1cdfb69a3bee4accb79e64f4f84632c58d6b56f8
            • Opcode Fuzzy Hash: ad2ff8a9c4b2a71be4e71311d4824f001c15e39263aa1094f74d6bbecebd3296
            • Instruction Fuzzy Hash: 3331F636600618EFCB16CF94C858EEA7BF9EB49311F144069FD058B261E779AD60DFA0
            APIs
              • Part of subcall function 00728432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00728449
              • Part of subcall function 00728432: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00728453
              • Part of subcall function 00728432: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00728462
              • Part of subcall function 00728432: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00728469
              • Part of subcall function 00728432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0072847F
            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007289CB
            • _memcmp.LIBCMT ref: 007289EE
            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00728A24
            • HeapFree.KERNEL32(00000000), ref: 00728A2B
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
            • String ID:
            • API String ID: 1592001646-0
            • Opcode ID: 1d2b1252ecf8dc803c4e4de8bfee34d3633027b14de6d21e089b1951f48b38dc
            • Instruction ID: 8cd25765dc4c6b365d36499a03a282c23a2a305bc063545c75fbe6b70317d149
            • Opcode Fuzzy Hash: 1d2b1252ecf8dc803c4e4de8bfee34d3633027b14de6d21e089b1951f48b38dc
            • Instruction Fuzzy Hash: 8F21B031E42218EFDB10DFA4D945BEEB7B8EF40351F14805AE454A7240EB3AAE45CF52
            APIs
            • __setmode.LIBCMT ref: 006F0B2E
              • Part of subcall function 006D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0073793F,?,?,00000000), ref: 006D5B8C
              • Part of subcall function 006D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0073793F,?,?,00000000,?,?), ref: 006D5BB0
            • _fprintf.LIBCMT ref: 006F0B65
            • OutputDebugStringW.KERNEL32(?), ref: 00726111
              • Part of subcall function 006F4C1A: _flsall.LIBCMT ref: 006F4C33
            • __setmode.LIBCMT ref: 006F0B9A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
            • String ID:
            • API String ID: 521402451-0
            • Opcode ID: 2dcb00e919572fbdd57e650e7ba9ee97cd953e3dd1474ab608514acd19e705f0
            • Instruction ID: 44374bd34433229e5087810bbff564b12159ac5d60527895687b2961876dd531
            • Opcode Fuzzy Hash: 2dcb00e919572fbdd57e650e7ba9ee97cd953e3dd1474ab608514acd19e705f0
            • Instruction Fuzzy Hash: 37113A3290420C7EEB4477B49C46DBE7B6B9F41320F14401FF31597683DE65584287AD
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007418B9
              • Part of subcall function 00741943: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00741962
              • Part of subcall function 00741943: InternetCloseHandle.WININET(00000000), ref: 007419FF
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Internet$CloseConnectHandleOpen
            • String ID:
            • API String ID: 1463438336-0
            • Opcode ID: 4721f17d6b2dd9944757d4f7bb52752be37571158d7d7517e58cfd54ba9de537
            • Instruction ID: b44350fcd41e32916d28f7abbce3df4011931ace5fa93fc7283721b0ca66bc66
            • Opcode Fuzzy Hash: 4721f17d6b2dd9944757d4f7bb52752be37571158d7d7517e58cfd54ba9de537
            • Instruction Fuzzy Hash: 9F212031200705FFEB11AF608C10FBABBADFF48700F90442AFA1596251DB79E86197A0
            APIs
            • GetFileAttributesW.KERNEL32(?,0075FAC0), ref: 00733AA8
            • GetLastError.KERNEL32 ref: 00733AB7
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00733AC6
            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0075FAC0), ref: 00733B23
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast
            • String ID:
            • API String ID: 2267087916-0
            • Opcode ID: e922f693b2fd1aeaa5d8c9441bc22e7ddf901aa66c7ee6c0bb0df06b467e048c
            • Instruction ID: 48af7a1963df83a36321ccfae654e6bf6240f63eba305e3e32840e037d5389ad
            • Opcode Fuzzy Hash: e922f693b2fd1aeaa5d8c9441bc22e7ddf901aa66c7ee6c0bb0df06b467e048c
            • Instruction Fuzzy Hash: 0321D8B05083118F9310DF28C88089FB7E4FE45724F148A1EF499C72A2D735DE05CB86
            APIs
            • _free.LIBCMT ref: 00705281
              • Part of subcall function 006F588C: __FF_MSGBANNER.LIBCMT ref: 006F58A3
              • Part of subcall function 006F588C: __NMSG_WRITE.LIBCMT ref: 006F58AA
              • Part of subcall function 006F588C: RtlAllocateHeap.NTDLL(01000000,00000000,00000001,00000000,?,?,?,006F0F53,?), ref: 006F58CF
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: AllocateHeap_free
            • String ID:
            • API String ID: 614378929-0
            • Opcode ID: de1b556cb4ce2712132c78d588a60b102e88268f0e1fbf4109f18ae5c17e4c79
            • Instruction ID: 0cdbf1c8b1b196e4915101fd7eb82227600bda64fcdfaf59112e45984a6725e6
            • Opcode Fuzzy Hash: de1b556cb4ce2712132c78d588a60b102e88268f0e1fbf4109f18ae5c17e4c79
            • Instruction Fuzzy Hash: 4D11E372901A19EFDB602F70AC0967F37D9BF00361B20462DFA04DB190DE3889408BA9
            APIs
            • _memset.LIBCMT ref: 006D4560
              • Part of subcall function 006D410D: _memset.LIBCMT ref: 006D418D
              • Part of subcall function 006D410D: _wcscpy.LIBCMT ref: 006D41E1
              • Part of subcall function 006D410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006D41F1
            • KillTimer.USER32(?,00000001,?,?), ref: 006D45B5
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006D45C4
            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0070D5FE
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
            • String ID:
            • API String ID: 1378193009-0
            • Opcode ID: 77bae2abd5e2b564c918699ddf056220325db0348eaaf5124d8b47cd4ccb2f27
            • Instruction ID: ef7fa17be4fef2144d3bda27f6f31bbe2ab24c2357e8b3a2fe1e5a07de9baf72
            • Opcode Fuzzy Hash: 77bae2abd5e2b564c918699ddf056220325db0348eaaf5124d8b47cd4ccb2f27
            • Instruction Fuzzy Hash: 4E2107B0904784DFEB328B64DC55BE7BBEDAF01308F04009EE68A96381C7B81E848B51
            APIs
              • Part of subcall function 006D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0073793F,?,?,00000000), ref: 006D5B8C
              • Part of subcall function 006D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0073793F,?,?,00000000,?,?), ref: 006D5BB0
            • gethostbyname.WSOCK32(?,?,?), ref: 007464AF
            • WSAGetLastError.WSOCK32(00000000), ref: 007464BA
            • _memmove.LIBCMT ref: 007464E7
            • inet_ntoa.WSOCK32(?), ref: 007464F2
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
            • String ID:
            • API String ID: 1504782959-0
            • Opcode ID: 38f896db51a22717d7a4952a41e508ebfa061b31874bcd33fd106e22f1bfbb61
            • Instruction ID: b74680f9b5160edf283bf22967d4227eaa4e60b62327e2ecd5adce669b57d70d
            • Opcode Fuzzy Hash: 38f896db51a22717d7a4952a41e508ebfa061b31874bcd33fd106e22f1bfbb61
            • Instruction Fuzzy Hash: 9F119031900608AFCB40FBA4DD86DEEB7B9AF04300B04802AF502A7261DF34AE04CBA5
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 00728E23
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00728E35
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00728E4B
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00728E66
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: da7dba4e4094627e586ada9bc22b24e548af10ef70bc34f4556080fd87238706
            • Instruction ID: 88df0f9ae463fa212efb8a888536b9645b3d3b03fde46e8ffc7cbbedd9e4d933
            • Opcode Fuzzy Hash: da7dba4e4094627e586ada9bc22b24e548af10ef70bc34f4556080fd87238706
            • Instruction Fuzzy Hash: B8112A79D01228FFEB11DFA5CC85E9EBBB8FB48710F214195E904B7290DA726E10DB94
            APIs
              • Part of subcall function 006D2612: GetWindowLongW.USER32(?,000000EB), ref: 006D2623
            • DefDlgProcW.USER32(?,00000020,?), ref: 006D12D8
            • GetClientRect.USER32(?,?), ref: 0070B77B
            • GetCursorPos.USER32(?), ref: 0070B785
            • ScreenToClient.USER32(?,?), ref: 0070B790
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Client$CursorLongProcRectScreenWindow
            • String ID:
            • API String ID: 4127811313-0
            • Opcode ID: f551872383f4bb565cbd0cfd46630c54d5a80c9c6e9184d9c16679d756801e9c
            • Instruction ID: 2143bb92e2ba612f11202bf8445e849f41097bea149fc4c72ccb87502843b693
            • Opcode Fuzzy Hash: f551872383f4bb565cbd0cfd46630c54d5a80c9c6e9184d9c16679d756801e9c
            • Instruction Fuzzy Hash: 6D113A35A00119FFCB10EFA4D8859EE77BAEB06301F504466F901EB250D7B5BB918BA9
            APIs
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0073001E,?,00731071,?,00008000), ref: 00731490
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0073001E,?,00731071,?,00008000), ref: 007314B5
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0073001E,?,00731071,?,00008000), ref: 007314BF
            • Sleep.KERNEL32(?,?,?,?,?,?,?,0073001E,?,00731071,?,00008000), ref: 007314F2
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CounterPerformanceQuerySleep
            • String ID:
            • API String ID: 2875609808-0
            • Opcode ID: 36f702963b7d36114ce2342bcd7334ebbdaec59dafc104035d47ecdd38e947f4
            • Instruction ID: 425ea3283171e416f5127dc972a5e45e37f0b0dbacdfb75ff38fe6a357a22e39
            • Opcode Fuzzy Hash: 36f702963b7d36114ce2342bcd7334ebbdaec59dafc104035d47ecdd38e947f4
            • Instruction Fuzzy Hash: BE117C31C01A6DDBDF00AFA5D948AEEBB78FF09712F408155E940B6241CB7899608B95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
            • String ID:
            • API String ID: 3016257755-0
            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
            • Instruction ID: ea917fa6c62423b39ade4275e6cd5945e49bb69a8c93ac0576e930ac3408f13e
            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
            • Instruction Fuzzy Hash: C001603284814EFBCF1A5F84CC058ED3FA6BB58340B448615FA18541A0C23AE971EB81
            APIs
            • GetWindowRect.USER32(?,?), ref: 0075B318
            • ScreenToClient.USER32(?,?), ref: 0075B330
            • ScreenToClient.USER32(?,?), ref: 0075B354
            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0075B36F
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClientRectScreen$InvalidateWindow
            • String ID:
            • API String ID: 357397906-0
            • Opcode ID: 8fd6f07155ec163b8e4fb903223ccbf999a1b521d5133609a5e018300c52fbef
            • Instruction ID: e92c3ee8a2aee6841816bdbab6a4ce1db694373e4a5fae31054497c7f9e520f6
            • Opcode Fuzzy Hash: 8fd6f07155ec163b8e4fb903223ccbf999a1b521d5133609a5e018300c52fbef
            • Instruction Fuzzy Hash: C21143B9D00209EFDB41CFA8C8849EEBBB9FB08311F108166E914E3220D775AA558F94
            APIs
            • EnterCriticalSection.KERNEL32(?), ref: 00736C8F
              • Part of subcall function 0073776D: _memset.LIBCMT ref: 007377A2
            • _memmove.LIBCMT ref: 00736CB2
            • _memset.LIBCMT ref: 00736CBF
            • LeaveCriticalSection.KERNEL32(?), ref: 00736CCF
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CriticalSection_memset$EnterLeave_memmove
            • String ID:
            • API String ID: 48991266-0
            • Opcode ID: aca5494e1b8e1eb4d4575435f0d2ea06926b005be34ecba673e162987653c091
            • Instruction ID: 7de865012b2967879a24369e950b5f1e4e3769981740ae53517de64fad4bf2ff
            • Opcode Fuzzy Hash: aca5494e1b8e1eb4d4575435f0d2ea06926b005be34ecba673e162987653c091
            • Instruction Fuzzy Hash: B5F0547A101204ABDF416F55DC85E8ABB2AFF45321F04C065FE096E21BCB75A911CBB4
            APIs
            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0072A179
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0072A18C
            • GetCurrentThreadId.KERNEL32 ref: 0072A193
            • AttachThreadInput.USER32(00000000), ref: 0072A19A
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: dba114018724858f78e92b657acd0d2de3846114e3c1484be23b0da4fbe749c0
            • Instruction ID: be307c78fcc1149d0e92324173ecbae1bff3d7d20b5e45ee721ccdf4fbe51d62
            • Opcode Fuzzy Hash: dba114018724858f78e92b657acd0d2de3846114e3c1484be23b0da4fbe749c0
            • Instruction Fuzzy Hash: 66E0ED3154532CBBEB205FA2EC0DED77F6CEF267B2F408025F50995060C6B98550CBA5
            APIs
            • GetSysColor.USER32(00000008), ref: 006D2231
            • SetTextColor.GDI32(?,000000FF), ref: 006D223B
            • SetBkMode.GDI32(?,00000001), ref: 006D2250
            • GetStockObject.GDI32(00000005), ref: 006D2258
            • GetWindowDC.USER32(?,00000000), ref: 0070C003
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0070C010
            • GetPixel.GDI32(00000000,?,00000000), ref: 0070C029
            • GetPixel.GDI32(00000000,00000000,?), ref: 0070C042
            • GetPixel.GDI32(00000000,?,?), ref: 0070C062
            • ReleaseDC.USER32(?,00000000), ref: 0070C06D
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
            • String ID:
            • API String ID: 1946975507-0
            • Opcode ID: f79db710b68a09fe91a18b1a6bd8ca626f4bacc4429b9dc7c1b764d5b0bc402b
            • Instruction ID: 9e7cb11aaa3037f3454e54e7063eda24d70505b534318b9e6153f1000e28f1c3
            • Opcode Fuzzy Hash: f79db710b68a09fe91a18b1a6bd8ca626f4bacc4429b9dc7c1b764d5b0bc402b
            • Instruction Fuzzy Hash: 65E06D32500648EAEB215F74FC0DBD83B10EB15333F00C366FAA9980E187B64A90DB11
            APIs
            • GetCurrentThread.KERNEL32 ref: 00728A43
            • OpenThreadToken.ADVAPI32(00000000,?,?,?,0072860E), ref: 00728A4A
            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0072860E), ref: 00728A57
            • OpenProcessToken.ADVAPI32(00000000,?,?,?,0072860E), ref: 00728A5E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CurrentOpenProcessThreadToken
            • String ID:
            • API String ID: 3974789173-0
            • Opcode ID: 38be50b5fda35c585900c4e8aef1f068c4c598226695d58d8e7f2afcab4fe935
            • Instruction ID: b747bae5f751fd6b44e5f0117c650a9009150a39999ca5175ed2315c44f00495
            • Opcode Fuzzy Hash: 38be50b5fda35c585900c4e8aef1f068c4c598226695d58d8e7f2afcab4fe935
            • Instruction Fuzzy Hash: 9BE04F766023219FDB605FB06D0CB9B3BA8AF50793F04C828E246CA080DA6894818755
            APIs
            • GetDesktopWindow.USER32 ref: 007120B6
            • GetDC.USER32(00000000), ref: 007120C0
            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007120E0
            • ReleaseDC.USER32(?), ref: 00712101
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: c6340c97a774780800ce4b5795e3fb8697823e6f1703a1a158a671f70fa8d56c
            • Instruction ID: dac6372df3632abb8e3f7c64d80abb51abd7291be58bbca63d467d3664235fee
            • Opcode Fuzzy Hash: c6340c97a774780800ce4b5795e3fb8697823e6f1703a1a158a671f70fa8d56c
            • Instruction Fuzzy Hash: 6AE0E575800208EFCB51AF60C80869E7BB2EB4C312F10C02AF85A97261DBB98182DF45
            APIs
            • GetDesktopWindow.USER32 ref: 007120CA
            • GetDC.USER32(00000000), ref: 007120D4
            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007120E0
            • ReleaseDC.USER32(?), ref: 00712101
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: c424bc04145daa1c05f04e5f35abef71cc0808cb7da3aaf2f85c4c0e22a5d245
            • Instruction ID: 7a83520fdd4fd534c9b1c9331570917111ab3002f7622055ede4187663a7e55d
            • Opcode Fuzzy Hash: c424bc04145daa1c05f04e5f35abef71cc0808cb7da3aaf2f85c4c0e22a5d245
            • Instruction Fuzzy Hash: 20E0E575C00204AFCB519F60C80869D7BA2EB4C312F10C02AF95A97260DBB991419F44
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID:
            • String ID: %v
            • API String ID: 0-3047460978
            • Opcode ID: e44e81cdef35726b508dc7bb7f8d3157166d51be6a797e713562a1a6b6f5b870
            • Instruction ID: c5bac791748a8303d328705b520e16fc1aea7f23bc72c77138b246da9ff4a512
            • Opcode Fuzzy Hash: e44e81cdef35726b508dc7bb7f8d3157166d51be6a797e713562a1a6b6f5b870
            • Instruction Fuzzy Hash: E5B17171D002099ACF24EF98C4919FDB7B6EF44310F54416BF502A7395EB349E86CB55
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __itow_s
            • String ID: xby$xby
            • API String ID: 3653519197-4172655841
            • Opcode ID: 6c08308fef23b0188230101e215e791b8afe51858a4636f63668adc55a34ed54
            • Instruction ID: b47c9b9d4a1f980e335665fcb0c80bef9ac2f249323a4f12d599794a377e5bdd
            • Opcode Fuzzy Hash: 6c08308fef23b0188230101e215e791b8afe51858a4636f63668adc55a34ed54
            • Instruction Fuzzy Hash: 78B18F71A00209EFDB14DF55C890EAEB7BAFF58300F14815AF9459B292EB78ED41CB64
            APIs
              • Part of subcall function 006EFE06: _wcscpy.LIBCMT ref: 006EFE29
              • Part of subcall function 006D9997: __itow.LIBCMT ref: 006D99C2
              • Part of subcall function 006D9997: __swprintf.LIBCMT ref: 006D9A0C
            • __wcsnicmp.LIBCMT ref: 0073B0B9
            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0073B182
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
            • String ID: LPT
            • API String ID: 3222508074-1350329615
            • Opcode ID: a19bcd86667b61c308935b93cfda65780705dcedcff7e5d5bc4ca800b4068a23
            • Instruction ID: c1def09cbb0faab7605a692a30d7056d43fab2ded51e9330359024df545f0f47
            • Opcode Fuzzy Hash: a19bcd86667b61c308935b93cfda65780705dcedcff7e5d5bc4ca800b4068a23
            • Instruction Fuzzy Hash: 6561A275E00219AFDB14DF94C891EAEB7B5EF08310F14415EFA46AB352DB74AE40CB94
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _memmove
            • String ID: Oan
            • API String ID: 4104443479-1382745430
            • Opcode ID: 4c13343b74a18aedabde52146293f75f745e93ac7a6ac0f40f3e62c82d3906ac
            • Instruction ID: 785bea6198ffaab08ed85593f8bd3ae094bf0bfcc3f09505974c7d8670a77107
            • Opcode Fuzzy Hash: 4c13343b74a18aedabde52146293f75f745e93ac7a6ac0f40f3e62c82d3906ac
            • Instruction Fuzzy Hash: 17514F70A01609DFDB64CF68C884AEEB7F1FF44314F148519E85AD7280EB35A995CB52
            APIs
            • Sleep.KERNEL32(00000000), ref: 006E2AC8
            • GlobalMemoryStatusEx.KERNEL32(?), ref: 006E2AE1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: 7f72ed7da856d9e67e8b3e1be78f18ba7f7efe7d8f9d58c416f471a027bb6737
            • Instruction ID: b5d06371d1bc8a1f0d2947841b07d1dbf6ca9203079f4821d4048252a8b1ec28
            • Opcode Fuzzy Hash: 7f72ed7da856d9e67e8b3e1be78f18ba7f7efe7d8f9d58c416f471a027bb6737
            • Instruction Fuzzy Hash: B4516A728187449BD360AF10DC86BAFBBF8FF84314F41885DF2D9411A1DB349569CB6A
            APIs
              • Part of subcall function 006D506B: __fread_nolock.LIBCMT ref: 006D5089
            • _wcscmp.LIBCMT ref: 007398CD
            • _wcscmp.LIBCMT ref: 007398E0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: _wcscmp$__fread_nolock
            • String ID: FILE
            • API String ID: 4029003684-3121273764
            • Opcode ID: 42acb1cdb95f3bf7a7a6b36078c906fb000369457185ea679d2673c3e6ff2fc5
            • Instruction ID: 60658670d9004f16d836e3e89e9650f21f3aff0faddeb23cbf74ea57171f0e85
            • Opcode Fuzzy Hash: 42acb1cdb95f3bf7a7a6b36078c906fb000369457185ea679d2673c3e6ff2fc5
            • Instruction Fuzzy Hash: B441FB71A0061DBBDF209AA0CC85FEFB7BEDF45710F00046EBA01B7281DA75A94587A5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID: Ddy$Ddy
            • API String ID: 1473721057-973355944
            • Opcode ID: 9b46727056b07ef41840e8c1adc6e13348929dbb03ca55d6dcc9cab9cdcc0597
            • Instruction ID: bd91c20fd13a69d1e175380e5a8f3ad446da01446193c09647da60868a34a1df
            • Opcode Fuzzy Hash: 9b46727056b07ef41840e8c1adc6e13348929dbb03ca55d6dcc9cab9cdcc0597
            • Instruction Fuzzy Hash: EA511574A08341CFD750CF59C480A6ABBF2BF98744F54895EE9858B361D375EC81CB82
            APIs
            • _memset.LIBCMT ref: 007426B4
            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007426EA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CrackInternet_memset
            • String ID: |
            • API String ID: 1413715105-2343686810
            • Opcode ID: 79f3f04e6be3d48ed6162e1d58a233786a1a09a7e335bf1d02495b8fe97c323e
            • Instruction ID: eebdec90b39c28caed55f23921683ac8a86058395e199c607a8e26602c0aa4db
            • Opcode Fuzzy Hash: 79f3f04e6be3d48ed6162e1d58a233786a1a09a7e335bf1d02495b8fe97c323e
            • Instruction Fuzzy Hash: D8311671C00119AFCF41AFA4CC85EEEBFB9FF08310F10006AF915A6266EB355A56DB64
            APIs
            • DestroyWindow.USER32(?,?,?,?), ref: 00756B49
            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00756B85
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$DestroyMove
            • String ID: static
            • API String ID: 2139405536-2160076837
            • Opcode ID: 627948bf97cda5fcff06d61433446e03a0393010f7f848d527bb519274466680
            • Instruction ID: 4288e38fe5b6992ce559ce2f62e3987ab97f49adda438303780a2a09b0e944ea
            • Opcode Fuzzy Hash: 627948bf97cda5fcff06d61433446e03a0393010f7f848d527bb519274466680
            • Instruction Fuzzy Hash: 96319C71100604AAEB109F64CC81AFB73B9FF48721F50961EFDA5D7190DBB8AC85CB64
            APIs
            • _memset.LIBCMT ref: 00732C09
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00732C44
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: bc21da971c2c7e3ff5938c7e76a519b9cea7c9d58d9183225d0c852475ebe10c
            • Instruction ID: 0709c197a7067963ed627993ff64c94e065e95da82f81b42b6d2665dfcbbcfe5
            • Opcode Fuzzy Hash: bc21da971c2c7e3ff5938c7e76a519b9cea7c9d58d9183225d0c852475ebe10c
            • Instruction Fuzzy Hash: 6A31F7316003099FFB358F48D885BAEBBB5EF05350F244019E985961A3E7789E42CB20
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00756793
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0075679E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: 6cf144870cf535dca47d295b78945f6171a7e7d71b31794c2e9b1b2bdac04fc2
            • Instruction ID: 6dfda9481b41bec2598bcce9f3b168cfd63678781b65468666c493ee04ab3367
            • Opcode Fuzzy Hash: 6cf144870cf535dca47d295b78945f6171a7e7d71b31794c2e9b1b2bdac04fc2
            • Instruction Fuzzy Hash: 7A11C475700208BFEF21DF24CC80EFB376AEB98369F504529FD1497290E6B99C5587A0
            APIs
              • Part of subcall function 006D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 006D1D73
              • Part of subcall function 006D1D35: GetStockObject.GDI32(00000011), ref: 006D1D87
              • Part of subcall function 006D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 006D1D91
            • GetWindowRect.USER32(00000000,?), ref: 00756CA3
            • GetSysColor.USER32(00000012), ref: 00756CBD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Window$ColorCreateMessageObjectRectSendStock
            • String ID: static
            • API String ID: 1983116058-2160076837
            • Opcode ID: f6b6fc0802259c02759e43b96defdad39bb3010a369e2352ae8d51b3eb4234df
            • Instruction ID: 41eff71d0f9015cf6a277be26ccc3dfff097c3b991c0c47d24012069268dbf86
            • Opcode Fuzzy Hash: f6b6fc0802259c02759e43b96defdad39bb3010a369e2352ae8d51b3eb4234df
            • Instruction Fuzzy Hash: 87212972510209AFDB04DFA8DC45AFA7BB8EB08315F004629FD55D3250E779F865DB60
            APIs
            • GetWindowTextLengthW.USER32(00000000), ref: 007569D4
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007569E3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit
            • API String ID: 2978978980-2167791130
            • Opcode ID: a36a8ecb929233d988a42163195ecc8bf02337ce8729c746bb7ba4e6f3139d13
            • Instruction ID: 2baca566407f9996b3343b0b0f2a7c1908add73b0483d621a6dfab2b3577b43f
            • Opcode Fuzzy Hash: a36a8ecb929233d988a42163195ecc8bf02337ce8729c746bb7ba4e6f3139d13
            • Instruction Fuzzy Hash: 83116D71500204ABEB114E64DC44AFB3769EB05366F908728FEA4971D0C7B9EC559760
            APIs
            • _memset.LIBCMT ref: 00732D1A
            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00732D39
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: f63ad655a94dd043af67ec287a9a701007ff6a65a6ba61fc25c2bca6638de5d9
            • Instruction ID: ef19fd3b8a196c4b5cd083a418e5cf897f87d428403f6db492868506d1d6599e
            • Opcode Fuzzy Hash: f63ad655a94dd043af67ec287a9a701007ff6a65a6ba61fc25c2bca6638de5d9
            • Instruction Fuzzy Hash: FF110831E11134ABEB21DF58DC84B9D77B9AB05300F144166EC15AB2B3DB38AE07C795
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00742342
            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0074236B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Internet$OpenOption
            • String ID: <local>
            • API String ID: 942729171-4266983199
            • Opcode ID: da7e7751fbc466da6a198cc52e863f8283121d4660a24e241c1a7a3b7c5bb567
            • Instruction ID: 7a6b5c522415f6fef16dd574ae093799989021d054b5c9be792b7c3b9194410b
            • Opcode Fuzzy Hash: da7e7751fbc466da6a198cc52e863f8283121d4660a24e241c1a7a3b7c5bb567
            • Instruction Fuzzy Hash: A311AC70541625FADB248F528C89EFBFBB8EF06751F90826AF94556001D3BC69A2C6F0
            APIs
            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,006D3C26,007952F8,?,?,?), ref: 006E0ACE
              • Part of subcall function 006D7D2C: _memmove.LIBCMT ref: 006D7D66
            • _wcscat.LIBCMT ref: 00715010
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FullNamePath_memmove_wcscat
            • String ID: Sy
            • API String ID: 257928180-1551782803
            • Opcode ID: f19c988e30caa83d1d8988c859e3b98fb712920526c5c7a095fa1bf05d8bdc38
            • Instruction ID: 6df3552d1b25c6980099748db4353a71b75561109c34b11f094c66aead5f014f
            • Opcode Fuzzy Hash: f19c988e30caa83d1d8988c859e3b98fb712920526c5c7a095fa1bf05d8bdc38
            • Instruction Fuzzy Hash: 2211A5309053189BCB51EBB4DC01AD973FAFF08344B0045AAF948D7291EAB49BC48B59
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 0072AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0072AEC7
            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00729135
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClassMessageNameSend_memmove
            • String ID: ComboBox$ListBox
            • API String ID: 372448540-1403004172
            • Opcode ID: 9023511ad6b07a343db064b37e6c93e0b6b93351c4d32291838b35e5e9549fd7
            • Instruction ID: a6e3f125683a1c5b0a42c2cfb361e6d2653d91db8c5a53c91c3b3d14afdfefd6
            • Opcode Fuzzy Hash: 9023511ad6b07a343db064b37e6c93e0b6b93351c4d32291838b35e5e9549fd7
            • Instruction Fuzzy Hash: 43012871A45229ABCB04FB64CC96CFE7369EF0A320B18061EF832573C2EE395808D750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: __fread_nolock_memmove
            • String ID: EA06
            • API String ID: 1988441806-3962188686
            • Opcode ID: 3a065ac0b88f9c645112020d7e70d195cd4484743acd50ad9105a0e6e75ee39f
            • Instruction ID: 15d53d90d2fbdd5c1d6a771c96eb2f00302d80a4428cc3c8a212c5dfb23609cf
            • Opcode Fuzzy Hash: 3a065ac0b88f9c645112020d7e70d195cd4484743acd50ad9105a0e6e75ee39f
            • Instruction Fuzzy Hash: C401F9718442186EDB68D6A8CC16EFE7BF89B01301F00459EF652D2181E9B8EA048760
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 0072AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0072AEC7
            • SendMessageW.USER32(?,00000180,00000000,?), ref: 0072902D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClassMessageNameSend_memmove
            • String ID: ComboBox$ListBox
            • API String ID: 372448540-1403004172
            • Opcode ID: cf8fbfdf83476c4b2d6e8f1a553fd1ea928eddb66d759805f40468cbcdcc32ee
            • Instruction ID: 59a53b29b583cc9c5ed95cab5a12edea728cc752cf28d0cb0c71291cf33908c4
            • Opcode Fuzzy Hash: cf8fbfdf83476c4b2d6e8f1a553fd1ea928eddb66d759805f40468cbcdcc32ee
            • Instruction Fuzzy Hash: 1601FC71E41219A7CB14E764DD96EFF73A9DF05300F14001AB90263281DE295E08D275
            APIs
              • Part of subcall function 006D7F41: _memmove.LIBCMT ref: 006D7F82
              • Part of subcall function 0072AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0072AEC7
            • SendMessageW.USER32(?,00000182,?,00000000), ref: 007290B0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClassMessageNameSend_memmove
            • String ID: ComboBox$ListBox
            • API String ID: 372448540-1403004172
            • Opcode ID: 9b8ee9346b42b855afc2e6cb2a4f284ace60a0e8c215ec3af50ac26052a27db7
            • Instruction ID: 7d01a34795ee7da97106c185c431d2653ec9bbec3e4abe6640e76f124039deed
            • Opcode Fuzzy Hash: 9b8ee9346b42b855afc2e6cb2a4f284ace60a0e8c215ec3af50ac26052a27db7
            • Instruction Fuzzy Hash: 4001DB71E45229B7DB14F764DD96EFF73AD9F15300F28001AB90263382DA2D9E0992B6
            APIs
            • VariantInit.OLEAUT32(?), ref: 0072C7F6
              • Part of subcall function 0072CB06: _memmove.LIBCMT ref: 0072CB50
              • Part of subcall function 0072CB06: VariantInit.OLEAUT32(00000000), ref: 0072CB72
              • Part of subcall function 0072CB06: VariantCopy.OLEAUT32(00000000,?), ref: 0072CB7C
            • VariantClear.OLEAUT32(?), ref: 0072C818
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: Variant$Init$ClearCopy_memmove
            • String ID: d}x
            • API String ID: 2932060187-1959806043
            • Opcode ID: e63cd875478b3b3737ffad7dca92b2b472bcd9e0d4e4b6574cc6317387ad56fa
            • Instruction ID: 1e705c9ddde7d51750b5a72c7ab330a9726a44a418b788dbd3adfbdf02a7e82a
            • Opcode Fuzzy Hash: e63cd875478b3b3737ffad7dca92b2b472bcd9e0d4e4b6574cc6317387ad56fa
            • Instruction Fuzzy Hash: 2B1130719007189FC720EFA6D88489AF7F8FF18310B50852FE54AC7611E774A944CBA4
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: ClassName_wcscmp
            • String ID: #32770
            • API String ID: 2292705959-463685578
            • Opcode ID: fd3d87bf018510829ecf0adfffc1007a6c7a11bef784047e370d986e13eca150
            • Instruction ID: 157d0d18b55ff14e0ed2638b4797c30ab3701155153f0c9a77a48a720a8de4e0
            • Opcode Fuzzy Hash: fd3d87bf018510829ecf0adfffc1007a6c7a11bef784047e370d986e13eca150
            • Instruction Fuzzy Hash: 9CE06872A0032D2BE720EBA9EC09FA7F7ACEB05771F01002BFD00D3151E9A49A1187E5
            APIs
              • Part of subcall function 0070B494: _memset.LIBCMT ref: 0070B4A1
              • Part of subcall function 006F0AC0: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0070B470,?,?,?,006D100A), ref: 006F0AC5
            • IsDebuggerPresent.KERNEL32(?,?,?,006D100A), ref: 0070B474
            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,006D100A), ref: 0070B483
            Strings
            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0070B47E
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
            • API String ID: 3158253471-631824599
            • Opcode ID: 85604f11870840b0917d432ad431b913261fb078966fdaccdc5647736ce87f0b
            • Instruction ID: bf39b857cf97fd9f971e948a97b91a97d3eb8f052f648cbd56a2e87bb2d10e11
            • Opcode Fuzzy Hash: 85604f11870840b0917d432ad431b913261fb078966fdaccdc5647736ce87f0b
            • Instruction Fuzzy Hash: 99E06DB0600B50CBE7209F34D8087467BE0AB00344F01CA6DE456C3782E7FCD645CBA1
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007559D7
            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 007559EA
              • Part of subcall function 007352EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00735363
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1448286925.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
            • Associated: 00000000.00000002.1448273880.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.000000000075F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448334141.0000000000784000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448366936.000000000078E000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1448381229.0000000000797000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6d0000_z1PURCHASEORDER.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 9fe5212121537ae55604f2975cebb1baaa87ac0d8b2af1452b58596f006201f6
            • Instruction ID: 3dea27a00af6ee242c9a0c17b0f8b2d3c93591f686c26e27c22a50a5501f5524
            • Opcode Fuzzy Hash: 9fe5212121537ae55604f2975cebb1baaa87ac0d8b2af1452b58596f006201f6
            • Instruction Fuzzy Hash: 99D0C9753C4311B7E6A4BB709C0FFD76A14BB00B51F004869F355AB1D1D9E8A8108658