Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Confirmation 003-23 170204.exe

Overview

General Information

Sample name:Purchase Confirmation 003-23 170204.exe
Analysis ID:1432028
MD5:baf61e5dbe33cf47ad6ddc4076a07af9
SHA1:1fc141512c6a2a4715fd533d0adc1d8ce3c7842f
SHA256:ea9deb59fc6309ddda6806eb4f7ce780eb54f1b0b7eca72b366bc8f110c5222a
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Confirmation 003-23 170204.exe (PID: 868 cmdline: "C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe" MD5: BAF61E5DBE33CF47AD6DDC4076A07AF9)
    • RegSvcs.exe (PID: 5276 cmdline: "C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.bezelety.top", "Username": "office11@bezelety.top", "Password": "KV?y1$dqdUzV                    "}
SourceRuleDescriptionAuthorStrings
00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000008.00000002.2509111644.0000000002CE8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x31735:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x317a7:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x31831:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x318c3:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3192d:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3199f:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x31a35:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31ac5:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                8.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  8.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 194.36.191.196, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 5276, Protocol: tcp, SourceIp: 192.168.2.11, SourceIsIpv6: false, SourcePort: 49703
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://bezelety.topAvira URL Cloud: Label: phishing
                    Source: http://mail.bezelety.topAvira URL Cloud: Label: phishing
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.bezelety.top", "Username": "office11@bezelety.top", "Password": "KV?y1$dqdUzV "}
                    Source: bezelety.topVirustotal: Detection: 13%Perma Link
                    Source: mail.bezelety.topVirustotal: Detection: 11%Perma Link
                    Source: http://mail.bezelety.topVirustotal: Detection: 11%Perma Link
                    Source: http://bezelety.topVirustotal: Detection: 13%Perma Link
                    Source: Purchase Confirmation 003-23 170204.exeVirustotal: Detection: 46%Perma Link
                    Source: Purchase Confirmation 003-23 170204.exeReversingLabs: Detection: 57%
                    Source: Purchase Confirmation 003-23 170204.exeJoe Sandbox ML: detected
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1277205849.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1279660815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1277205849.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1279660815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AA4696
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00AAC9C7
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAC93C FindFirstFileW,FindClose,0_2_00AAC93C
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AAF200
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AAF35D
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AAF65E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AA3A2B
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AA3D4E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AABF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AABF27
                    Source: global trafficTCP traffic: 192.168.2.11:49703 -> 194.36.191.196:587
                    Source: Joe Sandbox ViewIP Address: 194.36.191.196 194.36.191.196
                    Source: global trafficTCP traffic: 192.168.2.11:49703 -> 194.36.191.196:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00AB25E2
                    Source: global trafficDNS traffic detected: DNS query: mail.bezelety.top
                    Source: RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bezelety.top
                    Source: RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.bezelety.top
                    Source: RegSvcs.exe, 00000008.00000002.2507151222.0000000000F48000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                    Source: RegSvcs.exe, 00000008.00000002.2507151222.0000000000F48000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: Purchase Confirmation 003-23 170204.exe, 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, J4qms1IPBw.cs.Net Code: oow
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00AB425A
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00AB4458
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00AB425A
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00AA0219
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00ACCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00ACCDAC

                    System Summary

                    barindex
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: This is a third-party compiled AutoIt script.0_2_00A43B4C
                    Source: Purchase Confirmation 003-23 170204.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: Purchase Confirmation 003-23 170204.exe, 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9c0fee7f-f
                    Source: Purchase Confirmation 003-23 170204.exe, 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b06f2ab6-9
                    Source: Purchase Confirmation 003-23 170204.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_06a9a7ce-c
                    Source: Purchase Confirmation 003-23 170204.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ff9aa24a-6
                    Source: initial sampleStatic PE information: Filename: Purchase Confirmation 003-23 170204.exe
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA40B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00AA40B1
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A98858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A98858
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00AA545F
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A4E8000_2_00A4E800
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6DBB50_2_00A6DBB5
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A4E0600_2_00A4E060
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AC804A0_2_00AC804A
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A541400_2_00A54140
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A624050_2_00A62405
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A765220_2_00A76522
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AC06650_2_00AC0665
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A7267E0_2_00A7267E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6283A0_2_00A6283A
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A568430_2_00A56843
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A789DF0_2_00A789DF
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A76A940_2_00A76A94
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AC0AE20_2_00AC0AE2
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A58A0E0_2_00A58A0E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A9EB070_2_00A9EB07
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA8B130_2_00AA8B13
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6CD610_2_00A6CD61
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A770060_2_00A77006
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A531900_2_00A53190
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A5710E0_2_00A5710E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A412870_2_00A41287
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A633C70_2_00A633C7
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6F4190_2_00A6F419
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A616C40_2_00A616C4
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A558C00_2_00A558C0
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A678D30_2_00A678D3
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A61BB80_2_00A61BB8
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A79D050_2_00A79D05
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A4FE400_2_00A4FE40
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6BFE60_2_00A6BFE6
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A61FD00_2_00A61FD0
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_014E36600_2_014E3660
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_010F9B208_2_010F9B20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_010F4A988_2_010F4A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_010F3E808_2_010F3E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_010FCE988_2_010FCE98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_010F41C88_2_010F41C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_060956F08_2_060956F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_06093F588_2_06093F58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0609DD088_2_0609DD08
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0609BD008_2_0609BD00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_06099AE08_2_06099AE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_06092AF88_2_06092AF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_06098B9B8_2_06098B9B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_060900408_2_06090040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_060932438_2_06093243
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_060950108_2_06095010
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: String function: 00A47F41 appears 35 times
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: String function: 00A60D27 appears 70 times
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: String function: 00A68B40 appears 42 times
                    Source: Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1277205849.000000000402D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Confirmation 003-23 170204.exe
                    Source: Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1279197630.0000000003EC3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Confirmation 003-23 170204.exe
                    Source: Purchase Confirmation 003-23 170204.exe, 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename11704d33-910b-47d2-b12e-00e94b40b59a.exe4 vs Purchase Confirmation 003-23 170204.exe
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, Lds5plxAPDj.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, LZYJybC.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, wDxPSW1p.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, E0w8WLnyggK.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, ZBSJHga2buE.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, M4oIYVa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, kSS2HMsB8.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, kSS2HMsB8.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAA2D5 GetLastError,FormatMessageW,0_2_00AAA2D5
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A98713 AdjustTokenPrivileges,CloseHandle,0_2_00A98713
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A98CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A98CC3
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00AAB59E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00ABF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00ABF121
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB86D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00AB86D0
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A44FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00A44FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeFile created: C:\Users\user\AppData\Local\Temp\autF49E.tmpJump to behavior
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Purchase Confirmation 003-23 170204.exeVirustotal: Detection: 46%
                    Source: Purchase Confirmation 003-23 170204.exeReversingLabs: Detection: 57%
                    Source: unknownProcess created: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe "C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe"
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe"
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Purchase Confirmation 003-23 170204.exeStatic file information: File size 1116160 > 1048576
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1277205849.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1279660815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1277205849.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, Purchase Confirmation 003-23 170204.exe, 00000000.00000003.1279660815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: Purchase Confirmation 003-23 170204.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00ABC304 LoadLibraryA,GetProcAddress,0_2_00ABC304
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A68B85 push ecx; ret 0_2_00A68B98
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeFile created: \purchase confirmation 003-23 170204.exe
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeFile created: \purchase confirmation 003-23 170204.exeJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A44A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A44A35
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AC55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00AC55FD
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A633C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00A633C7
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6886Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 984Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-100444
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeAPI coverage: 4.6 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AA4696
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00AAC9C7
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAC93C FindFirstFileW,FindClose,0_2_00AAC93C
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AAF200
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AAF35D
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AAF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AAF65E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AA3A2B
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AA3D4E
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AABF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AABF27
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A44AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A44AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98779Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97797Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96265Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96047Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllr
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeAPI call chain: ExitProcess graph end nodegraph_0-98764
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeAPI call chain: ExitProcess graph end nodegraph_0-98836
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB41FD BlockInput,0_2_00AB41FD
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A43B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A43B4C
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A75CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00A75CCC
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00ABC304 LoadLibraryA,GetProcAddress,0_2_00ABC304
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_014E3550 mov eax, dword ptr fs:[00000030h]0_2_014E3550
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_014E34F0 mov eax, dword ptr fs:[00000030h]0_2_014E34F0
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_014E1ED0 mov eax, dword ptr fs:[00000030h]0_2_014E1ED0
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A981F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00A981F7
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A6A395
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6A364 SetUnhandledExceptionFilter,0_2_00A6A364
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: BE2008Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A98C93 LogonUserW,0_2_00A98C93
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A43B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A43B4C
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A44A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A44A35
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA4EF5 mouse_event,0_2_00AA4EF5
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A981F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00A981F7
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AA4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00AA4C03
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A6886B cpuid 0_2_00A6886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A750D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00A750D7
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A82230 GetUserNameW,0_2_00A82230
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A7418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00A7418A
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00A44AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A44AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2509111644.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2509111644.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Confirmation 003-23 170204.exe PID: 868, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5276, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: WIN_81
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: WIN_XP
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: WIN_XPe
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: WIN_VISTA
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: WIN_7
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: WIN_8
                    Source: Purchase Confirmation 003-23 170204.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2509111644.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Confirmation 003-23 170204.exe PID: 868, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5276, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Confirmation 003-23 170204.exe.2210000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2509111644.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.2509111644.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Confirmation 003-23 170204.exe PID: 868, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5276, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00AB6596
                    Source: C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exeCode function: 0_2_00AB6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00AB6A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS38
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets141
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    11
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials121
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Purchase Confirmation 003-23 170204.exe46%VirustotalBrowse
                    Purchase Confirmation 003-23 170204.exe58%ReversingLabsWin32.Worm.DorkBot
                    Purchase Confirmation 003-23 170204.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    bezelety.top14%VirustotalBrowse
                    mail.bezelety.top12%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://r3.o.lencr.org00%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://r3.i.lencr.org/00%URL Reputationsafe
                    http://bezelety.top100%Avira URL Cloudphishing
                    http://mail.bezelety.top100%Avira URL Cloudphishing
                    http://mail.bezelety.top12%VirustotalBrowse
                    http://bezelety.top14%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bezelety.top
                    194.36.191.196
                    truefalseunknown
                    mail.bezelety.top
                    unknown
                    unknowntrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://r3.o.lencr.org0RegSvcs.exe, 00000008.00000002.2507151222.0000000000F48000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/Purchase Confirmation 003-23 170204.exe, 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      http://mail.bezelety.topRegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 12%, Virustotal, Browse
                      • Avira URL Cloud: phishing
                      unknown
                      http://x1.c.lencr.org/0RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://bezelety.topRegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 14%, Virustotal, Browse
                      • Avira URL Cloud: phishing
                      unknown
                      http://r3.i.lencr.org/0RegSvcs.exe, 00000008.00000002.2507151222.0000000000F48000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2510640456.0000000005E30000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2507483866.0000000000FD0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      194.36.191.196
                      bezelety.topNetherlands
                      60117HSAEfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1432028
                      Start date and time:2024-04-26 10:06:11 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 0s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Purchase Confirmation 003-23 170204.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 59
                      • Number of non-executed functions: 265
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      10:07:07API Interceptor39x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      194.36.191.196http://store.avast.com/store?SiteID=avast&Action=DisplayRedirectCustomPage&Locale=en_US&v=1&t=event&tid=UA-58120669-65&cid=725399894.1568213989&ec=Emailing_Digital%20River&aip=1&cm10=1&ds=Avast&ul=en_US&cs=Digital%20River&cm=email&cd2=Paid&cd3=725399894.1568213989&cd4=Business&cd5=BMG-00-001-36-AR&cd7=13306019910&cd6=22895593139&cd8=0&cd9=4871168000&cd10=USD&cd11=44&cd12=1659005853297&ea=Click&el=http://0gjysc.wildlifewalkabout.com/am9lbC5uYXNzaWZAYXJuLmFlGet hashmaliciousUnknownBrowse
                      • 0gjysc.wildlifewalkabout.com/am9lbC5uYXNzaWZAYXJuLmFl
                      #U6025-146102220896 BSIU2505935-Remitance Advise.xlsxGet hashmaliciousFormBookBrowse
                      • www.firstflightmdelivery.services/inug/?LJBd06wP=my5vzthd/gf6h+YfXGHF51EmCUBukXLQvdzfbkPp7mscRjHMsb7qcEfg2/kZIm7kG7WZ0g==&-ZcxnF=8p74g4BxA
                      jun.exeGet hashmaliciousAZORultBrowse
                      • squerad.com/cgi-sys/suspendedpage.cgi
                      Player offer.exeGet hashmaliciousAZORultBrowse
                      • squerad.com/frank/index.php
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      bezelety.topOrder Enquiry MX-M754N_20240207_114441.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      z1RFQ20838_CMC_RITM50736681.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      PI-23-24-041 AEH-CIPL 6-202424-014 .exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      vIgBIsAluf.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      PO MIU100011010 SKM0020240311.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      BOQ- AE20003 SWMT00946 20240403 Ref 00985398 for project.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      HSAERFQ-HL51L05.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      RFQ-HL51L05.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      RFQ-HL51L05.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      Order Enquiry MX-M754N_20240207_114441.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      PDT_7367027738832_789257820__________________________.exeGet hashmaliciousAgentTeslaBrowse
                      • 185.244.151.84
                      SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.1274.17126.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      Arba Outstanding Statement.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                      • 185.244.151.84
                      WZM.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                      • 185.244.151.84
                      z1RFQ20838_CMC_RITM50736681.exeGet hashmaliciousAgentTeslaBrowse
                      • 194.36.191.196
                      https://doggygangers.com/YfMv2QsjpCQl845BWSYNfNOQitweyze_Z6lIlrRr43MRjX_HrM/downloadsdownloadfile/dwnl_standart.phpGet hashmaliciousLummaC, PureLog Stealer, RedLine, SectopRAT, zgRATBrowse
                      • 194.36.191.196
                      No context
                      No context
                      Process:C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):155330
                      Entropy (8bit):7.919843163113897
                      Encrypted:false
                      SSDEEP:3072:ObfBnDfJyZV3ef+QSkflAtjtstHYw0nUbkhA6LFy0ytxMC//u4ld:45Dfgzuf5SEytJwUUbQA6gFtxU4ld
                      MD5:42A65DDD6A823BC0553FE1545228CE90
                      SHA1:436BDA1C8660ADFC0C86B5A4550CB09004F560D6
                      SHA-256:623EFDF259FEBBBBA6601B51FB5018FD19AC082CF6C711C7920AAE7FF8A5A832
                      SHA-512:F59FE31B47C671D1704547A218EAF44860CDE4BEFF30EAD589FA41194F38893D020144C24F2A0CD968DB6DA833009FA00453CD5EDEE00D196A253FDF35EBE231
                      Malicious:false
                      Reputation:low
                      Preview:EA06.....Z4.j\.P.V...~..K....Z..S.Pk3)...4P....V.K...f..5....^.~..=..c.....6.^..(r9..Q9.\&..-~y<..*W9.._y..b...../..'...2...N.Z.Y.^.......4kQE.M..*m....M....,K.T*\...h}...Dfe7..A.*.j..i.`...sjD....*...1..(.)8..I.M......hv...b....P.W.:.n..g].........P...n.F..@.;~..&tP......, ..Z....'z.S.Hn..%.V.h.NYP.B..4ej.._.b.P...5I..MB..........*......\.-.9G..m.N4..R....0.%..2.4(sz.T......+...+.../....gW..7..[M..}...e....$Rm.N.u.dy.Lv.. ../.<.*....MG.;C.......o2...-../..>...Z.P..........u..].....?h...1._;...Ue.xF..?.p.r.|fe#.Kg..%^]R...u..`.q.h.y.>....bV...-..P.'....i0_.W[...h....t..H.4....^..%..D.....u.p..Un..E.........Bl.hpd.z.{..P..p....@....C...[y....a...%W.3.7.B.V....<....{S...x..&..e.Ul....m0.M.uz5f.d.G../-.A.L.5J......v.-.c|..m=<.f.....4.4....y.G...vz.]......>....M..=uC...V`.....6.Le.y..k...*Qh.....J.Si@..(...^.N..'5i..B.T.})Tn.1...).N.9.......T.V....4.4X...L~.F..*.y.0.......e....k...;......U+...w*..mJ..(6....F...Sy.&g..o+t.=F....*t.}.n..G....m2..
                      Process:C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):9918
                      Entropy (8bit):7.587192239652588
                      Encrypted:false
                      SSDEEP:192:C+cK50L02Jtyl2ftvwmziMVC6baopzBvq55Uz660tEXNzLrOOCyVqQE++:h750LRJtyl2ftLCghBmx60tEXBXOF02p
                      MD5:5800D9A896F108DBA02CC41723C727FC
                      SHA1:1F0C9B5EDE875FBB8709877A160BA447FAB5AD9A
                      SHA-256:C70618D26D85F314E33C337654718668E79F1445D299F053A16F30D7232B7DA8
                      SHA-512:FB4A3D12D0599F03318830ABBDEA4F7096EB71407303C434E48EA608B63149032D7B787CD9ABD9F6D67CE6E83418E297593E08E3EF55726F8687B5D19838DA64
                      Malicious:false
                      Reputation:low
                      Preview:EA06..p0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                      Process:C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):240128
                      Entropy (8bit):6.731324055784085
                      Encrypted:false
                      SSDEEP:6144:mNQBQ/Epsk70OsGtfjOTKZkwCb+G9wR/dG:mNj/kDYNGZjRmt9M/Q
                      MD5:C56B08D91141CA7DDF2666F3911190BF
                      SHA1:DC2D855BFE3EA7A2B24D830EC3A0520A2591A42C
                      SHA-256:74751E0E13C3FAA1AC5F4B34A580AB9B8CB365C5643089FCE30075AE99C53BB6
                      SHA-512:EDD4BC671CBA5770B783462F92250D94A7972183F4059EE1E85CC5F57292C1604DF3832BF40A19BB5D3600DAB0C9D317DB62EA0493D03C0301085A84CD9A09DE
                      Malicious:false
                      Reputation:low
                      Preview:.h.6K3QPFZXY..AK.SHEB7SS.AY276H3QPBZXYPUAK1SHEB7SSFAY276H3QP.ZXY^J.E1.A.c.R..`.Z^EhC#?%(94p6 %_<<e Rs!3/y[Y..|.p/5<<~XLA.SHEB7SS..Y2{7K3x.?XYPUAK1S.E@6XRMAY.46H;QPBZXY..BK1sHEB.PSFA.27.H3QRBZ\YPUAK1SLEB7SSFAY236H1QPBZXYRU..1SXEB'SSFAI27&H3QPBZHYPUAK1SHEB7..EA.276H.RP._XYPUAK1SHEB7SSFAY27.K3]PBZXYPUAK1SHEB7SSFAY276H3QPBZXYPUAK1SHEB7SSFAY276H3QpBZPYPUAK1SHEB7[sFA.276H3QPBZXY~!$3ESHE.PSFaY27.K3QRBZXYPUAK1SHEB7sSF!w@DD+3QP._XYP.BK1UHEB.PSFAY276H3QPBZ.YP.o9T?'&B7_SFAY.46H1QPB.[YPUAK1SHEB7SS.AYp76H3QPBZXYPUAK1S(.A7SSFA.276J3TP..ZY.d@K2SHEC7SUFAY276H3QPBZXYPUAK1SHEB7SSFAY276H3QPBZXYPUAK1SHE_........Kv93W.|.>.V.."..<.x\.S."&...u\....w G.xS.Jr..O...C.;T)C....y+:"F-.@|\'.D..j..p$..._>.;...6w.YUw.h....k...U,....?..+*/.2#6-<.dW.R#9.X.XPUAK....../9.h.5G-eB:....uYI....-SFA=276:3QP#ZXY.UAK^SHE,7SS8AY2I6H3.PBZ.YPUvK1SmEB7>SFA}27663QP.'WV.."B..EB7SSs....[....m..c0.O.*}..7...h2e.<9.5.....O..8..Ue8Ue..560L6SWFYTd^....rJAF2QTBBU.9}..q.|.i..@...M./FAY276.3Q.BZX..U.K1S.E.7..FAY..6.3.P...Y
                      Process:C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe
                      File Type:ASCII text, with very long lines (28720), with no line terminators
                      Category:dropped
                      Size (bytes):28720
                      Entropy (8bit):3.597683173837778
                      Encrypted:false
                      SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNboE+I026c024vfF3if6g:wiTZ+2QoioGRk6ZklputwjpjBkCiw2Rb
                      MD5:0ECDBC6BA5EEDE7F71CD803288AA896C
                      SHA1:A383180B1268BC329EEC6A626C78BE27E0BAFEE2
                      SHA-256:57CBA8E607187B38A7089FE75F1E929D6FC08A287DFFB7A7256F433B0429ED27
                      SHA-512:7CB9C11C1679E32DB42C99F41ECCC35F73ED20B1204870109C4FC5C79202F81D33AB26DE7AD4592059F6AF5D23852B4138D0B57284001BEA5A80056D45220C35
                      Malicious:false
                      Reputation:low
                      Preview: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
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.961112371613167
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:Purchase Confirmation 003-23 170204.exe
                      File size:1'116'160 bytes
                      MD5:baf61e5dbe33cf47ad6ddc4076a07af9
                      SHA1:1fc141512c6a2a4715fd533d0adc1d8ce3c7842f
                      SHA256:ea9deb59fc6309ddda6806eb4f7ce780eb54f1b0b7eca72b366bc8f110c5222a
                      SHA512:2463f0c87870b5ddac391dcb88209cef983db246447fe1844c303d0d33c0eb1d3f70f9a7895b4fea00690862b268a36cfd69f19c18478d96c57afdf0fe11e59f
                      SSDEEP:24576:+AHnh+eWsN3skA4RV1Hom2KXMmHa39eGsaq4QzOZIRE5:ph+ZkldoPK8Ya3QGa4Q+IY
                      TLSH:11359C3263918336FFAB9D73DB5DB20D56BC6D250123852FD29C2F79A9F01B1122D262
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                      Icon Hash:1a5ada12a98c3689
                      Entrypoint:0x42800a
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x662A0666 [Thu Apr 25 07:29:42 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                      Instruction
                      call 00007FFAF8B6777Dh
                      jmp 00007FFAF8B5A534h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push edi
                      push esi
                      mov esi, dword ptr [esp+10h]
                      mov ecx, dword ptr [esp+14h]
                      mov edi, dword ptr [esp+0Ch]
                      mov eax, ecx
                      mov edx, ecx
                      add eax, esi
                      cmp edi, esi
                      jbe 00007FFAF8B5A6BAh
                      cmp edi, eax
                      jc 00007FFAF8B5AA1Eh
                      bt dword ptr [004C41FCh], 01h
                      jnc 00007FFAF8B5A6B9h
                      rep movsb
                      jmp 00007FFAF8B5A9CCh
                      cmp ecx, 00000080h
                      jc 00007FFAF8B5A884h
                      mov eax, edi
                      xor eax, esi
                      test eax, 0000000Fh
                      jne 00007FFAF8B5A6C0h
                      bt dword ptr [004BF324h], 01h
                      jc 00007FFAF8B5AB90h
                      bt dword ptr [004C41FCh], 00000000h
                      jnc 00007FFAF8B5A85Dh
                      test edi, 00000003h
                      jne 00007FFAF8B5A86Eh
                      test esi, 00000003h
                      jne 00007FFAF8B5A84Dh
                      bt edi, 02h
                      jnc 00007FFAF8B5A6BFh
                      mov eax, dword ptr [esi]
                      sub ecx, 04h
                      lea esi, dword ptr [esi+04h]
                      mov dword ptr [edi], eax
                      lea edi, dword ptr [edi+04h]
                      bt edi, 03h
                      jnc 00007FFAF8B5A6C3h
                      movq xmm1, qword ptr [esi]
                      sub ecx, 08h
                      lea esi, dword ptr [esi+08h]
                      movq qword ptr [edi], xmm1
                      lea edi, dword ptr [edi+08h]
                      test esi, 00000007h
                      je 00007FFAF8B5A715h
                      bt esi, 03h
                      Programming Language:
                      • [ASM] VS2013 build 21005
                      • [ C ] VS2013 build 21005
                      • [C++] VS2013 build 21005
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      • [ASM] VS2013 UPD5 build 40629
                      • [RES] VS2013 build 21005
                      • [LNK] VS2013 UPD5 build 40629
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x460d8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x10f0000x7134.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xc80000x460d80x46200897af0fb84a8ddf60c071b0f93d8a60dFalse0.7472739806149733data7.302090029934919IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x10f0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xc84580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                      RT_ICON0xc85800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                      RT_ICON0xc86a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xc87d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.046891636105524666
                      RT_MENU0xd8ff80x50dataEnglishGreat Britain0.9
                      RT_STRING0xd90480x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xd95dc0x68adataEnglishGreat Britain0.2747909199522103
                      RT_STRING0xd9c680x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xda0f80x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xda6f40x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xdad500x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xdb1b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xdb3100x3287cdata1.0003430415708405
                      RT_GROUP_ICON0x10db8c0x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0x10dba00x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0x10dbb40x14dataEnglishGreat Britain1.15
                      RT_GROUP_ICON0x10dbc80x14dataEnglishGreat Britain1.25
                      RT_VERSION0x10dbdc0x10cdataEnglishGreat Britain0.5932835820895522
                      RT_MANIFEST0x10dce80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampSource PortDest PortSource IPDest IP
                      Apr 26, 2024 10:07:09.011022091 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:09.250386953 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:09.250478983 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:09.617316961 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:09.657109976 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:09.905616045 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:09.905795097 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:10.151628971 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:10.159318924 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:10.440906048 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:10.464503050 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:10.464523077 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:10.464541912 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:10.464581966 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:10.503381014 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:10.747061014 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:10.747267962 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:10.762582064 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:11.002007008 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:11.003112078 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:11.254133940 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:11.255067110 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:11.528578043 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:11.532766104 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:11.784782887 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:11.786983013 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:12.036183119 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:12.036602020 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:12.276004076 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:12.276690960 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:12.276772022 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:12.276798010 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:12.276828051 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:07:12.553673983 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:12.553703070 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:12.553718090 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:12.553734064 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:12.609863043 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:07:12.662631989 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:08:49.287990093 CEST49703587192.168.2.11194.36.191.196
                      Apr 26, 2024 10:08:49.530075073 CEST58749703194.36.191.196192.168.2.11
                      Apr 26, 2024 10:08:49.534236908 CEST49703587192.168.2.11194.36.191.196
                      TimestampSource PortDest PortSource IPDest IP
                      Apr 26, 2024 10:07:08.392683029 CEST6531353192.168.2.111.1.1.1
                      Apr 26, 2024 10:07:09.003490925 CEST53653131.1.1.1192.168.2.11
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Apr 26, 2024 10:07:08.392683029 CEST192.168.2.111.1.1.10x27c6Standard query (0)mail.bezelety.topA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Apr 26, 2024 10:07:09.003490925 CEST1.1.1.1192.168.2.110x27c6No error (0)mail.bezelety.topbezelety.topCNAME (Canonical name)IN (0x0001)false
                      Apr 26, 2024 10:07:09.003490925 CEST1.1.1.1192.168.2.110x27c6No error (0)bezelety.top194.36.191.196A (IP address)IN (0x0001)false
                      TimestampSource PortDest PortSource IPDest IPCommands
                      Apr 26, 2024 10:07:09.617316961 CEST58749703194.36.191.196192.168.2.11220-hosting1.nl.hostsailor.com ESMTP Exim 4.96.2 #2 Fri, 26 Apr 2024 10:07:09 +0200
                      220-We do not authorize the use of this system to transport unsolicited,
                      220 and/or bulk e-mail.
                      Apr 26, 2024 10:07:09.657109976 CEST49703587192.168.2.11194.36.191.196EHLO 374653
                      Apr 26, 2024 10:07:09.905616045 CEST58749703194.36.191.196192.168.2.11250-hosting1.nl.hostsailor.com Hello 374653 [102.129.152.220]
                      250-SIZE 52428800
                      250-8BITMIME
                      250-PIPELINING
                      250-PIPECONNECT
                      250-STARTTLS
                      250 HELP
                      Apr 26, 2024 10:07:09.905795097 CEST49703587192.168.2.11194.36.191.196STARTTLS
                      Apr 26, 2024 10:07:10.151628971 CEST58749703194.36.191.196192.168.2.11220 TLS go ahead

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:10:07:05
                      Start date:26/04/2024
                      Path:C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe"
                      Imagebase:0xa40000
                      File size:1'116'160 bytes
                      MD5 hash:BAF61E5DBE33CF47AD6DDC4076A07AF9
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1286015462.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:8
                      Start time:10:07:06
                      Start date:26/04/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\Purchase Confirmation 003-23 170204.exe"
                      Imagebase:0x890000
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2506684443.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2509111644.0000000002CE8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2509111644.0000000002CBE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2509111644.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2509111644.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:4.1%
                        Dynamic/Decrypted Code Coverage:0.4%
                        Signature Coverage:2.6%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:54
                        execution_graph 98708 a41055 98713 a42649 98708->98713 98723 a477c7 98713->98723 98717 a42754 98718 a4105a 98717->98718 98731 a43416 59 API calls 2 library calls 98717->98731 98720 a62f80 98718->98720 98777 a62e84 98720->98777 98722 a41064 98732 a60ff6 98723->98732 98725 a477e8 98726 a60ff6 Mailbox 59 API calls 98725->98726 98727 a426b7 98726->98727 98728 a43582 98727->98728 98770 a435b0 98728->98770 98731->98717 98734 a60ffe 98732->98734 98735 a61018 98734->98735 98737 a6101c std::exception::exception 98734->98737 98742 a6594c 98734->98742 98759 a635e1 DecodePointer 98734->98759 98735->98725 98760 a687db RaiseException 98737->98760 98739 a61046 98761 a68711 58 API calls _free 98739->98761 98741 a61058 98741->98725 98743 a659c7 98742->98743 98747 a65958 98742->98747 98768 a635e1 DecodePointer 98743->98768 98745 a659cd 98769 a68d68 58 API calls __getptd_noexit 98745->98769 98746 a65963 98746->98747 98762 a6a3ab 58 API calls __NMSG_WRITE 98746->98762 98763 a6a408 58 API calls 5 library calls 98746->98763 98764 a632df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98746->98764 98747->98746 98750 a6598b RtlAllocateHeap 98747->98750 98753 a659b3 98747->98753 98757 a659b1 98747->98757 98765 a635e1 DecodePointer 98747->98765 98750->98747 98751 a659bf 98750->98751 98751->98734 98766 a68d68 58 API calls __getptd_noexit 98753->98766 98767 a68d68 58 API calls __getptd_noexit 98757->98767 98759->98734 98760->98739 98761->98741 98762->98746 98763->98746 98765->98747 98766->98757 98767->98751 98768->98745 98769->98751 98771 a435bd 98770->98771 98772 a435a1 98770->98772 98771->98772 98773 a435c4 RegOpenKeyExW 98771->98773 98772->98717 98773->98772 98774 a435de RegQueryValueExW 98773->98774 98775 a43614 RegCloseKey 98774->98775 98776 a435ff 98774->98776 98775->98772 98776->98775 98778 a62e90 _fprintf 98777->98778 98785 a63457 98778->98785 98784 a62eb7 _fprintf 98784->98722 98802 a69e4b 98785->98802 98787 a62e99 98788 a62ec8 DecodePointer DecodePointer 98787->98788 98789 a62ea5 98788->98789 98790 a62ef5 98788->98790 98799 a62ec2 98789->98799 98790->98789 98848 a689e4 59 API calls _fprintf 98790->98848 98792 a62f58 EncodePointer EncodePointer 98792->98789 98793 a62f07 98793->98792 98794 a62f2c 98793->98794 98849 a68aa4 61 API calls 2 library calls 98793->98849 98794->98789 98797 a62f46 EncodePointer 98794->98797 98850 a68aa4 61 API calls 2 library calls 98794->98850 98797->98792 98798 a62f40 98798->98789 98798->98797 98851 a63460 98799->98851 98803 a69e6f EnterCriticalSection 98802->98803 98804 a69e5c 98802->98804 98803->98787 98809 a69ed3 98804->98809 98806 a69e62 98806->98803 98833 a632f5 58 API calls 3 library calls 98806->98833 98810 a69edf _fprintf 98809->98810 98811 a69f00 98810->98811 98812 a69ee8 98810->98812 98825 a69f21 _fprintf 98811->98825 98837 a68a5d 58 API calls 2 library calls 98811->98837 98834 a6a3ab 58 API calls __NMSG_WRITE 98812->98834 98814 a69eed 98835 a6a408 58 API calls 5 library calls 98814->98835 98817 a69f15 98819 a69f1c 98817->98819 98820 a69f2b 98817->98820 98818 a69ef4 98836 a632df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98818->98836 98838 a68d68 58 API calls __getptd_noexit 98819->98838 98823 a69e4b __lock 58 API calls 98820->98823 98826 a69f32 98823->98826 98825->98806 98827 a69f57 98826->98827 98828 a69f3f 98826->98828 98840 a62f95 98827->98840 98839 a6a06b InitializeCriticalSectionAndSpinCount 98828->98839 98831 a69f4b 98846 a69f73 LeaveCriticalSection _doexit 98831->98846 98834->98814 98835->98818 98837->98817 98838->98825 98839->98831 98841 a62f9e RtlFreeHeap 98840->98841 98842 a62fc7 __dosmaperr 98840->98842 98841->98842 98843 a62fb3 98841->98843 98842->98831 98847 a68d68 58 API calls __getptd_noexit 98843->98847 98845 a62fb9 GetLastError 98845->98842 98846->98825 98847->98845 98848->98793 98849->98794 98850->98798 98854 a69fb5 LeaveCriticalSection 98851->98854 98853 a62ec7 98853->98784 98854->98853 98855 a7ff06 98856 a7ff10 98855->98856 98861 a4ac90 Mailbox _memmove 98855->98861 99166 a48e34 59 API calls Mailbox 98856->99166 98859 a4b685 99175 aaa0b5 89 API calls 4 library calls 98859->99175 98861->98859 98865 a4a1b7 98861->98865 98885 a4a097 Mailbox 98861->98885 98888 a4b416 98861->98888 98891 a80c94 98861->98891 98893 a80ca2 98861->98893 98896 a4b37c 98861->98896 98897 a60ff6 59 API calls Mailbox 98861->98897 98904 a4ade2 Mailbox 98861->98904 98912 a4a000 98861->98912 99075 abc5f4 98861->99075 99107 aa7be0 98861->99107 99113 a47f41 98861->99113 99117 abbf80 98861->99117 99157 a966f4 98861->99157 99167 a97405 59 API calls 98861->99167 99168 abc4a7 85 API calls 2 library calls 98861->99168 98863 a60ff6 59 API calls Mailbox 98863->98885 98867 a4b5d5 99171 a481a7 98867->99171 98868 a4b5da 99180 aaa0b5 89 API calls 4 library calls 98868->99180 98871 a8047f 99170 aaa0b5 89 API calls 4 library calls 98871->99170 98872 a477c7 59 API calls 98872->98885 98875 a481a7 59 API calls 98875->98885 98877 a97405 59 API calls 98877->98885 98878 a8048e 98879 a62f80 67 API calls __cinit 98879->98885 98881 a966f4 Mailbox 59 API calls 98881->98865 98882 a80e00 99179 aaa0b5 89 API calls 4 library calls 98882->99179 98885->98863 98885->98865 98885->98867 98885->98868 98885->98871 98885->98872 98885->98875 98885->98877 98885->98879 98885->98882 98887 a4a6ba 98885->98887 99160 a4ca20 331 API calls 2 library calls 98885->99160 99161 a4ba60 60 API calls Mailbox 98885->99161 99178 aaa0b5 89 API calls 4 library calls 98887->99178 99165 a4f803 331 API calls 98888->99165 99176 a49df0 59 API calls Mailbox 98891->99176 99177 aaa0b5 89 API calls 4 library calls 98893->99177 98895 a80c86 98895->98865 98895->98881 99163 a49e9c 60 API calls Mailbox 98896->99163 98897->98861 98899 a4b38d 99164 a49e9c 60 API calls Mailbox 98899->99164 98904->98859 98904->98865 98904->98895 98905 a800e0 VariantClear 98904->98905 98935 abe24b 98904->98935 98938 a52123 98904->98938 98978 ab474d 98904->98978 98987 abe237 98904->98987 98990 aad2e6 98904->98990 99037 ac23c9 98904->99037 99162 a49df0 59 API calls Mailbox 98904->99162 99169 a97405 59 API calls 98904->99169 98905->98904 98913 a4a01f 98912->98913 98928 a4a04d Mailbox 98912->98928 98914 a60ff6 Mailbox 59 API calls 98913->98914 98914->98928 98915 a4b5d5 98916 a481a7 59 API calls 98915->98916 98930 a4a1b7 98916->98930 98917 a97405 59 API calls 98917->98928 98918 a477c7 59 API calls 98918->98928 98919 a60ff6 59 API calls Mailbox 98919->98928 98923 a8047f 99183 aaa0b5 89 API calls 4 library calls 98923->99183 98926 a481a7 59 API calls 98926->98928 98927 a8048e 98927->98861 98928->98915 98928->98917 98928->98918 98928->98919 98928->98923 98928->98926 98929 a62f80 67 API calls __cinit 98928->98929 98928->98930 98931 a80e00 98928->98931 98933 a4a6ba 98928->98933 98934 a4b5da 98928->98934 99181 a4ca20 331 API calls 2 library calls 98928->99181 99182 a4ba60 60 API calls Mailbox 98928->99182 98929->98928 98930->98861 99185 aaa0b5 89 API calls 4 library calls 98931->99185 99184 aaa0b5 89 API calls 4 library calls 98933->99184 99186 aaa0b5 89 API calls 4 library calls 98934->99186 99187 abcdf1 98935->99187 98937 abe25b 98937->98904 99343 a49bf8 98938->99343 98942 a60ff6 Mailbox 59 API calls 98943 a52154 98942->98943 98946 a52164 98943->98946 99380 a45906 60 API calls Mailbox 98943->99380 98944 a869af 98945 a52189 98944->98945 99401 aaf7df 59 API calls 98944->99401 98954 a52196 98945->98954 99376 a49c9c 98945->99376 98948 a49997 84 API calls 98946->98948 98950 a52172 98948->98950 99381 a45956 98950->99381 98952 a869f7 98952->98954 98955 a869ff 98952->98955 99356 a45e3f 98954->99356 98957 a49c9c 59 API calls 98955->98957 98959 a5219d 98957->98959 98960 a521b7 98959->98960 98961 a86a11 98959->98961 98962 a477c7 59 API calls 98960->98962 98963 a60ff6 Mailbox 59 API calls 98961->98963 98965 a521bf 98962->98965 98964 a86a17 98963->98964 98966 a86a2b 98964->98966 99402 a459b0 ReadFile SetFilePointerEx 98964->99402 99361 a456d2 98965->99361 98972 a86a2f _memmove 98966->98972 99403 aa794e 59 API calls 2 library calls 98966->99403 98970 a521ce 98970->98972 99394 a49b9c 59 API calls Mailbox 98970->99394 98973 a521e2 Mailbox 98974 a5221c 98973->98974 99395 a45dcf 98973->99395 98974->98904 98979 a49997 84 API calls 98978->98979 98980 ab4787 98979->98980 99489 a463a0 98980->99489 98982 ab4797 98983 ab47bc 98982->98983 98984 a4a000 331 API calls 98982->98984 98985 a49bf8 59 API calls 98983->98985 98986 ab47c0 98983->98986 98984->98983 98985->98986 98986->98904 98988 abcdf1 130 API calls 98987->98988 98989 abe247 98988->98989 98989->98904 98991 aad310 98990->98991 98992 aad305 98990->98992 98994 aad3ea Mailbox 98991->98994 98997 a477c7 59 API calls 98991->98997 98993 a49c9c 59 API calls 98992->98993 98993->98991 98995 a60ff6 Mailbox 59 API calls 98994->98995 99033 aad3f3 Mailbox 98994->99033 98996 aad433 98995->98996 98998 aad43f 98996->98998 99597 a45906 60 API calls Mailbox 98996->99597 98999 aad334 98997->98999 99002 a49997 84 API calls 98998->99002 99001 a477c7 59 API calls 98999->99001 99003 aad33d 99001->99003 99004 aad457 99002->99004 99005 a49997 84 API calls 99003->99005 99006 a45956 67 API calls 99004->99006 99007 aad349 99005->99007 99008 aad466 99006->99008 99533 a446f9 99007->99533 99010 aad46a GetLastError 99008->99010 99011 aad49e 99008->99011 99014 aad483 99010->99014 99016 aad4c9 99011->99016 99017 aad500 99011->99017 99012 aad35e 99584 a47c8e 99012->99584 99014->99033 99598 a45a1a CloseHandle 99014->99598 99020 a60ff6 Mailbox 59 API calls 99016->99020 99019 a60ff6 Mailbox 59 API calls 99017->99019 99018 aad3e3 99022 a49c9c 59 API calls 99018->99022 99024 aad505 99019->99024 99025 aad4ce 99020->99025 99022->98994 99029 a477c7 59 API calls 99024->99029 99024->99033 99027 aad4df 99025->99027 99030 a477c7 59 API calls 99025->99030 99599 aaf835 59 API calls 2 library calls 99027->99599 99028 aad3a5 99032 a47f41 59 API calls 99028->99032 99029->99033 99030->99027 99034 aad3b2 99032->99034 99033->98904 99596 aa3c66 63 API calls Mailbox 99034->99596 99036 aad3bb Mailbox 99036->99018 99038 a477c7 59 API calls 99037->99038 99039 ac23e0 99038->99039 99040 a49997 84 API calls 99039->99040 99041 ac23ef 99040->99041 99042 a47b76 59 API calls 99041->99042 99043 ac2402 99042->99043 99044 a49997 84 API calls 99043->99044 99045 ac240f 99044->99045 99046 ac249d 99045->99046 99047 ac2429 99045->99047 99048 a49997 84 API calls 99046->99048 99049 a49c9c 59 API calls 99047->99049 99050 ac24a2 99048->99050 99051 ac242e 99049->99051 99052 ac24ce 99050->99052 99053 ac24b0 99050->99053 99054 ac248c 99051->99054 99058 ac2445 99051->99058 99055 ac24e3 99052->99055 99059 a49c9c 59 API calls 99052->99059 99057 a49bf8 59 API calls 99053->99057 99056 a49bf8 59 API calls 99054->99056 99060 ac24f8 99055->99060 99062 a49c9c 59 API calls 99055->99062 99072 ac2499 Mailbox 99056->99072 99057->99072 99061 a479ab 59 API calls 99058->99061 99059->99055 99615 a480d7 99060->99615 99064 ac2452 99061->99064 99062->99060 99066 a47c8e 59 API calls 99064->99066 99065 ac2512 99619 a9f8f2 99065->99619 99068 ac2460 99066->99068 99069 a479ab 59 API calls 99068->99069 99070 ac2479 99069->99070 99071 a47c8e 59 API calls 99070->99071 99074 ac2487 99071->99074 99072->98904 99638 a49b9c 59 API calls Mailbox 99074->99638 99076 a477c7 59 API calls 99075->99076 99077 abc608 99076->99077 99078 a477c7 59 API calls 99077->99078 99079 abc610 99078->99079 99080 a477c7 59 API calls 99079->99080 99081 abc618 99080->99081 99082 a49997 84 API calls 99081->99082 99106 abc626 99082->99106 99083 a47d2c 59 API calls 99083->99106 99084 abc80f 99085 abc83c Mailbox 99084->99085 99659 a49b9c 59 API calls Mailbox 99084->99659 99085->98861 99087 abc7f6 99652 a47e0b 99087->99652 99089 a47a84 59 API calls 99089->99106 99090 abc811 99093 a47e0b 59 API calls 99090->99093 99091 a481a7 59 API calls 99091->99106 99095 abc820 99093->99095 99094 a47c8e 59 API calls 99094->99084 99098 a47c8e 59 API calls 99095->99098 99096 a47faf 59 API calls 99097 abc6bd CharUpperBuffW 99096->99097 99639 a4859a 68 API calls 99097->99639 99098->99084 99099 a47faf 59 API calls 99101 abc77d CharUpperBuffW 99099->99101 99640 a4c707 99101->99640 99103 a49997 84 API calls 99103->99106 99104 a47e0b 59 API calls 99104->99106 99105 a47c8e 59 API calls 99105->99106 99106->99083 99106->99084 99106->99085 99106->99087 99106->99089 99106->99090 99106->99091 99106->99096 99106->99099 99106->99103 99106->99104 99106->99105 99108 aa7bec 99107->99108 99109 a60ff6 Mailbox 59 API calls 99108->99109 99110 aa7bfa 99109->99110 99111 aa7c08 99110->99111 99112 a477c7 59 API calls 99110->99112 99111->98861 99112->99111 99114 a47f50 __NMSG_WRITE _memmove 99113->99114 99115 a60ff6 Mailbox 59 API calls 99114->99115 99116 a47f8e 99115->99116 99116->98861 99118 abbfab 99117->99118 99119 abbfc5 99117->99119 99667 aaa0b5 89 API calls 4 library calls 99118->99667 99668 aba528 59 API calls Mailbox 99119->99668 99122 abbfd0 99123 a4a000 330 API calls 99122->99123 99124 abc031 99123->99124 99125 abbfbd Mailbox 99124->99125 99126 abc0c3 99124->99126 99130 abc072 99124->99130 99125->98861 99127 abc119 99126->99127 99128 abc0c9 99126->99128 99127->99125 99129 a49997 84 API calls 99127->99129 99689 aa7ba4 59 API calls 99128->99689 99131 abc12b 99129->99131 99669 aa7581 59 API calls Mailbox 99130->99669 99133 a47faf 59 API calls 99131->99133 99136 abc14f CharUpperBuffW 99133->99136 99134 abc0ec 99690 a45ea1 59 API calls Mailbox 99134->99690 99140 abc169 99136->99140 99138 abc0a2 99670 a4f5c0 99138->99670 99141 abc1bc 99140->99141 99142 abc170 99140->99142 99144 a49997 84 API calls 99141->99144 99692 aa7581 59 API calls Mailbox 99142->99692 99143 abc0f4 Mailbox 99691 a4fe40 331 API calls 2 library calls 99143->99691 99146 abc1c4 99144->99146 99693 a49fbd 60 API calls 99146->99693 99149 abc19e 99150 a4f5c0 330 API calls 99149->99150 99150->99125 99151 abc1ce 99151->99125 99152 a49997 84 API calls 99151->99152 99153 abc1e9 99152->99153 99694 a45ea1 59 API calls Mailbox 99153->99694 99155 abc1f9 99695 a4fe40 331 API calls 2 library calls 99155->99695 100774 a96636 99157->100774 99159 a96702 99159->98861 99160->98885 99161->98885 99162->98904 99163->98899 99164->98888 99165->98859 99166->98861 99167->98861 99168->98861 99169->98904 99170->98878 99172 a481b2 99171->99172 99173 a481ba 99171->99173 99174 a480d7 59 API calls 99172->99174 99173->98865 99174->99173 99175->98895 99176->98895 99177->98895 99178->98865 99179->98868 99180->98865 99181->98928 99182->98928 99183->98927 99184->98930 99185->98934 99186->98930 99225 a49997 99187->99225 99191 abd0cd 99192 abd242 99191->99192 99196 abd0db 99191->99196 99293 abdbdc 92 API calls Mailbox 99192->99293 99195 abd251 99195->99196 99198 abd25d 99195->99198 99256 abcc82 99196->99256 99197 a49997 84 API calls 99215 abcec6 Mailbox 99197->99215 99208 abce75 Mailbox 99198->99208 99203 abd114 99271 a60e48 99203->99271 99206 abd12e 99277 aaa0b5 89 API calls 4 library calls 99206->99277 99207 abd147 99278 a4942e 99207->99278 99208->98937 99211 abd139 GetCurrentProcess TerminateProcess 99211->99207 99215->99191 99215->99197 99215->99208 99275 aaf835 59 API calls 2 library calls 99215->99275 99276 abd2f3 61 API calls 2 library calls 99215->99276 99217 abd2b8 99217->99208 99221 abd2cc FreeLibrary 99217->99221 99218 abd17f 99290 abd95d 107 API calls _free 99218->99290 99221->99208 99224 abd190 99224->99217 99291 a48ea0 59 API calls Mailbox 99224->99291 99292 a49e9c 60 API calls Mailbox 99224->99292 99294 abd95d 107 API calls _free 99224->99294 99226 a499b1 99225->99226 99238 a499ab 99225->99238 99227 a7f9fc __i64tow 99226->99227 99228 a499f9 99226->99228 99230 a499b7 __itow 99226->99230 99233 a7f903 99226->99233 99295 a638d8 83 API calls 3 library calls 99228->99295 99232 a60ff6 Mailbox 59 API calls 99230->99232 99234 a499d1 99232->99234 99235 a7f97b Mailbox _wcscpy 99233->99235 99236 a60ff6 Mailbox 59 API calls 99233->99236 99237 a47f41 59 API calls 99234->99237 99234->99238 99296 a638d8 83 API calls 3 library calls 99235->99296 99239 a7f948 99236->99239 99237->99238 99238->99208 99243 abdab9 99238->99243 99240 a60ff6 Mailbox 59 API calls 99239->99240 99241 a7f96e 99240->99241 99241->99235 99242 a47f41 59 API calls 99241->99242 99242->99235 99297 a47faf 99243->99297 99245 abdad4 CharLowerBuffW 99301 a9f658 99245->99301 99249 a477c7 59 API calls 99250 abdb0d 99249->99250 99308 a479ab 99250->99308 99252 abdb24 99321 a47e8c 99252->99321 99254 abdb30 Mailbox 99255 abdb6c Mailbox 99254->99255 99325 abd2f3 61 API calls 2 library calls 99254->99325 99255->99215 99257 abccf2 99256->99257 99258 abcc9d 99256->99258 99262 abdd64 99257->99262 99259 a60ff6 Mailbox 59 API calls 99258->99259 99261 abccbf 99259->99261 99260 a60ff6 Mailbox 59 API calls 99260->99261 99261->99257 99261->99260 99263 abdf8d Mailbox 99262->99263 99268 abdd87 _strcat _wcscpy __NMSG_WRITE 99262->99268 99263->99203 99264 a49d46 59 API calls 99264->99268 99265 a49c9c 59 API calls 99265->99268 99266 a49cf8 59 API calls 99266->99268 99267 a49997 84 API calls 99267->99268 99268->99263 99268->99264 99268->99265 99268->99266 99268->99267 99269 a6594c 58 API calls __crtLCMapStringA_stat 99268->99269 99332 aa5b29 61 API calls 2 library calls 99268->99332 99269->99268 99274 a60e5d 99271->99274 99272 a60ef5 VirtualAlloc 99273 a60ec3 99272->99273 99273->99206 99273->99207 99274->99272 99274->99273 99275->99215 99276->99215 99277->99211 99279 a49436 99278->99279 99280 a60ff6 Mailbox 59 API calls 99279->99280 99281 a49444 99280->99281 99282 a49450 99281->99282 99333 a4935c 59 API calls Mailbox 99281->99333 99284 a491b0 99282->99284 99334 a492c0 99284->99334 99286 a491bf 99287 a60ff6 Mailbox 59 API calls 99286->99287 99288 a4925b 99286->99288 99287->99288 99288->99224 99289 a48ea0 59 API calls Mailbox 99288->99289 99289->99218 99290->99224 99291->99224 99292->99224 99293->99195 99294->99224 99295->99230 99296->99227 99298 a47fc2 99297->99298 99300 a47fbf _memmove 99297->99300 99299 a60ff6 Mailbox 59 API calls 99298->99299 99299->99300 99300->99245 99302 a9f683 __NMSG_WRITE 99301->99302 99303 a9f6c2 99302->99303 99306 a9f6b8 99302->99306 99307 a9f769 99302->99307 99303->99249 99303->99254 99306->99303 99326 a47a24 61 API calls 99306->99326 99307->99303 99327 a47a24 61 API calls 99307->99327 99309 a47a17 99308->99309 99310 a479ba 99308->99310 99311 a47e8c 59 API calls 99309->99311 99310->99309 99312 a479c5 99310->99312 99317 a479e8 _memmove 99311->99317 99313 a479e0 99312->99313 99314 a7ef32 99312->99314 99328 a48087 59 API calls Mailbox 99313->99328 99329 a48189 99314->99329 99317->99252 99318 a7ef3c 99319 a60ff6 Mailbox 59 API calls 99318->99319 99320 a7ef5c 99319->99320 99322 a47e9a 99321->99322 99324 a47ea3 _memmove 99321->99324 99323 a47faf 59 API calls 99322->99323 99322->99324 99323->99324 99324->99254 99325->99255 99326->99306 99327->99307 99328->99317 99330 a60ff6 Mailbox 59 API calls 99329->99330 99331 a48193 99330->99331 99331->99318 99332->99268 99333->99282 99335 a492c9 Mailbox 99334->99335 99336 a7f5c8 99335->99336 99341 a492d3 99335->99341 99337 a60ff6 Mailbox 59 API calls 99336->99337 99339 a7f5d4 99337->99339 99338 a492da 99338->99286 99339->99339 99341->99338 99342 a49df0 59 API calls Mailbox 99341->99342 99342->99341 99344 a7fbff 99343->99344 99345 a49c08 99343->99345 99346 a7fc10 99344->99346 99404 a47d2c 99344->99404 99350 a60ff6 Mailbox 59 API calls 99345->99350 99413 a47eec 99346->99413 99349 a7fc1a 99354 a49c34 99349->99354 99355 a477c7 59 API calls 99349->99355 99351 a49c1b 99350->99351 99351->99349 99352 a49c26 99351->99352 99353 a47f41 59 API calls 99352->99353 99352->99354 99353->99354 99354->98942 99354->98944 99355->99354 99418 a45c4e 99356->99418 99359 a45c4e 2 API calls 99360 a45e74 99359->99360 99360->98959 99362 a45702 99361->99362 99363 a456dd 99361->99363 99364 a47eec 59 API calls 99362->99364 99363->99362 99367 a456ec 99363->99367 99368 aa349a 99364->99368 99365 aa34c9 99365->98970 99430 a45c18 99367->99430 99368->99365 99428 aa3436 ReadFile SetFilePointerEx 99368->99428 99429 a47a84 59 API calls 2 library calls 99368->99429 99375 aa35d8 Mailbox 99375->98970 99377 a49cad 99376->99377 99378 a49cb2 99376->99378 99377->99378 99458 a637ca 59 API calls 99377->99458 99378->98952 99380->98946 99382 a45dcf CloseHandle 99381->99382 99383 a45962 99382->99383 99459 a45df9 99383->99459 99385 a45981 99386 a459a4 99385->99386 99467 a45770 99385->99467 99386->98944 99386->98945 99400 a45a1a CloseHandle 99386->99400 99388 a45993 99484 a453db SetFilePointerEx SetFilePointerEx 99388->99484 99390 a4599a 99390->99386 99391 a7e030 99390->99391 99485 aa3696 SetFilePointerEx SetFilePointerEx WriteFile 99391->99485 99393 a7e060 99393->99386 99394->98973 99396 a45de8 99395->99396 99397 a45dd9 99395->99397 99396->99397 99398 a45ded CloseHandle 99396->99398 99397->98974 99399 a45a1a CloseHandle 99397->99399 99398->99397 99399->98974 99400->98944 99401->98944 99402->98966 99403->98972 99405 a47da5 99404->99405 99406 a47d38 __NMSG_WRITE 99404->99406 99407 a47e8c 59 API calls 99405->99407 99408 a47d73 99406->99408 99409 a47d4e 99406->99409 99412 a47d56 _memmove 99407->99412 99411 a48189 59 API calls 99408->99411 99417 a48087 59 API calls Mailbox 99409->99417 99411->99412 99412->99346 99414 a47f06 99413->99414 99416 a47ef9 99413->99416 99415 a60ff6 Mailbox 59 API calls 99414->99415 99415->99416 99416->99349 99417->99412 99425 a45c68 99418->99425 99419 a7e151 99427 a45dae SetFilePointerEx 99419->99427 99420 a45cef SetFilePointerEx 99426 a45dae SetFilePointerEx 99420->99426 99423 a45cc3 99423->99359 99424 a7e16b 99425->99419 99425->99420 99425->99423 99426->99423 99427->99424 99428->99368 99429->99368 99431 a60ff6 Mailbox 59 API calls 99430->99431 99432 a45c2b 99431->99432 99433 a60ff6 Mailbox 59 API calls 99432->99433 99434 a45c37 99433->99434 99435 a45632 99434->99435 99442 a45a2f 99435->99442 99438 a45674 99438->99375 99441 a4793a 61 API calls Mailbox 99438->99441 99440 a45643 99440->99438 99449 a45d20 99440->99449 99455 a45bda 59 API calls 2 library calls 99440->99455 99441->99375 99443 a7e065 99442->99443 99444 a45a40 99442->99444 99456 a96443 59 API calls Mailbox 99443->99456 99444->99440 99446 a7e06f 99447 a60ff6 Mailbox 59 API calls 99446->99447 99448 a7e07b 99447->99448 99450 a45d93 99449->99450 99451 a45d2e 99449->99451 99457 a45dae SetFilePointerEx 99450->99457 99453 a45d56 99451->99453 99454 a45d66 ReadFile 99451->99454 99453->99440 99454->99451 99454->99453 99455->99440 99456->99446 99457->99451 99458->99378 99460 a7e181 99459->99460 99461 a45e12 CreateFileW 99459->99461 99462 a7e187 CreateFileW 99460->99462 99464 a45e34 99460->99464 99461->99464 99463 a7e1ad 99462->99463 99462->99464 99465 a45c4e 2 API calls 99463->99465 99464->99385 99466 a7e1b8 99465->99466 99466->99464 99468 a4578b 99467->99468 99469 a7dfce 99467->99469 99470 a45c4e 2 API calls 99468->99470 99483 a4581a 99468->99483 99473 a45e3f 2 API calls 99469->99473 99469->99483 99471 a457ad 99470->99471 99486 a4538e 99471->99486 99473->99483 99475 a457c4 99476 a60ff6 Mailbox 59 API calls 99475->99476 99477 a457cf 99476->99477 99478 a4538e 59 API calls 99477->99478 99479 a457da 99478->99479 99480 a45d20 2 API calls 99479->99480 99481 a45807 99480->99481 99482 a45c4e 2 API calls 99481->99482 99482->99483 99483->99388 99484->99390 99485->99393 99487 a60ff6 Mailbox 59 API calls 99486->99487 99488 a453a0 99487->99488 99488->99469 99488->99475 99514 a47b76 99489->99514 99491 a463c5 99492 a465ca 99491->99492 99497 a7e41f 99491->99497 99498 a4766f 59 API calls 99491->99498 99500 a468f9 _memmove 99491->99500 99503 a47eec 59 API calls 99491->99503 99507 a7e3bb 99491->99507 99511 a47faf 59 API calls 99491->99511 99519 a460cc 60 API calls 99491->99519 99520 a45ea1 59 API calls Mailbox 99491->99520 99529 a45fd2 60 API calls 99491->99529 99530 a47a84 59 API calls 2 library calls 99491->99530 99521 a4766f 99492->99521 99494 a465e4 Mailbox 99494->98982 99531 a9fdba 91 API calls 4 library calls 99497->99531 99498->99491 99532 a9fdba 91 API calls 4 library calls 99500->99532 99503->99491 99504 a7e42d 99505 a4766f 59 API calls 99504->99505 99506 a7e443 99505->99506 99506->99494 99508 a48189 59 API calls 99507->99508 99510 a7e3c6 99508->99510 99513 a60ff6 Mailbox 59 API calls 99510->99513 99512 a4659b CharUpperBuffW 99511->99512 99512->99491 99513->99500 99515 a60ff6 Mailbox 59 API calls 99514->99515 99516 a47b9b 99515->99516 99517 a48189 59 API calls 99516->99517 99518 a47baa 99517->99518 99518->99491 99519->99491 99520->99491 99522 a4770f 99521->99522 99526 a47682 _memmove 99521->99526 99524 a60ff6 Mailbox 59 API calls 99522->99524 99523 a60ff6 Mailbox 59 API calls 99525 a47689 99523->99525 99524->99526 99527 a60ff6 Mailbox 59 API calls 99525->99527 99528 a476b2 99525->99528 99526->99523 99527->99528 99528->99494 99529->99491 99530->99491 99531->99504 99532->99494 99534 a477c7 59 API calls 99533->99534 99535 a4470f 99534->99535 99536 a477c7 59 API calls 99535->99536 99537 a44717 99536->99537 99538 a477c7 59 API calls 99537->99538 99539 a4471f 99538->99539 99540 a477c7 59 API calls 99539->99540 99541 a44727 99540->99541 99542 a7d8fb 99541->99542 99543 a4475b 99541->99543 99544 a481a7 59 API calls 99542->99544 99545 a479ab 59 API calls 99543->99545 99546 a7d904 99544->99546 99547 a44769 99545->99547 99548 a47eec 59 API calls 99546->99548 99549 a47e8c 59 API calls 99547->99549 99551 a4479e 99548->99551 99550 a44773 99549->99550 99550->99551 99552 a479ab 59 API calls 99550->99552 99554 a7d924 99551->99554 99555 a447bd 99551->99555 99568 a447de 99551->99568 99556 a44794 99552->99556 99553 a479ab 59 API calls 99557 a447ef 99553->99557 99558 a7d9f4 99554->99558 99569 a7d9dd 99554->99569 99578 a7d95b 99554->99578 99600 a47b52 99555->99600 99559 a47e8c 59 API calls 99556->99559 99561 a44801 99557->99561 99564 a481a7 59 API calls 99557->99564 99562 a47d2c 59 API calls 99558->99562 99559->99551 99565 a44811 99561->99565 99566 a481a7 59 API calls 99561->99566 99579 a7d9b1 99562->99579 99564->99561 99570 a481a7 59 API calls 99565->99570 99571 a44818 99565->99571 99566->99565 99567 a479ab 59 API calls 99567->99568 99568->99553 99569->99558 99574 a7d9c8 99569->99574 99570->99571 99572 a481a7 59 API calls 99571->99572 99581 a4481f Mailbox 99571->99581 99572->99581 99573 a47b52 59 API calls 99573->99579 99576 a47d2c 59 API calls 99574->99576 99575 a7d9b9 99577 a47d2c 59 API calls 99575->99577 99576->99579 99577->99579 99578->99575 99582 a7d9a4 99578->99582 99579->99568 99579->99573 99603 a47a84 59 API calls 2 library calls 99579->99603 99581->99012 99583 a47d2c 59 API calls 99582->99583 99583->99579 99585 a7f094 99584->99585 99586 a47ca0 99584->99586 99610 a98123 59 API calls _memmove 99585->99610 99604 a47bb1 99586->99604 99589 a47cac 99589->99018 99593 aa3e73 99589->99593 99590 a7f09e 99591 a481a7 59 API calls 99590->99591 99592 a7f0a6 Mailbox 99591->99592 99611 aa4696 GetFileAttributesW 99593->99611 99596->99036 99597->98998 99598->99033 99599->99033 99601 a47faf 59 API calls 99600->99601 99602 a447c7 99601->99602 99602->99567 99602->99568 99603->99579 99605 a47be5 _memmove 99604->99605 99606 a47bbf 99604->99606 99605->99589 99605->99605 99606->99605 99607 a60ff6 Mailbox 59 API calls 99606->99607 99608 a47c34 99607->99608 99609 a60ff6 Mailbox 59 API calls 99608->99609 99609->99605 99610->99590 99612 aa46b1 FindFirstFileW 99611->99612 99613 aa3e7a 99611->99613 99612->99613 99614 aa46c6 FindClose 99612->99614 99613->99018 99613->99028 99614->99613 99616 a480e7 99615->99616 99618 a480fa _memmove 99615->99618 99617 a60ff6 Mailbox 59 API calls 99616->99617 99616->99618 99617->99618 99618->99065 99620 a477c7 59 API calls 99619->99620 99621 a9f905 99620->99621 99622 a47b76 59 API calls 99621->99622 99623 a9f919 99622->99623 99624 a9f658 61 API calls 99623->99624 99635 a9f93b 99623->99635 99626 a9f935 99624->99626 99625 a9f658 61 API calls 99625->99635 99628 a479ab 59 API calls 99626->99628 99626->99635 99627 a9f9b5 99630 a479ab 59 API calls 99627->99630 99628->99635 99629 a479ab 59 API calls 99629->99635 99631 a9f9ce 99630->99631 99633 a47c8e 59 API calls 99631->99633 99632 a47c8e 59 API calls 99632->99635 99634 a9f9da 99633->99634 99636 a480d7 59 API calls 99634->99636 99637 a9f9e9 Mailbox 99634->99637 99635->99625 99635->99627 99635->99629 99635->99632 99636->99637 99637->99074 99638->99072 99639->99106 99641 a47b76 59 API calls 99640->99641 99642 a4c72c _wcscmp 99640->99642 99641->99642 99643 a47f41 59 API calls 99642->99643 99645 a4c760 Mailbox 99642->99645 99644 a81abb 99643->99644 99646 a47c8e 59 API calls 99644->99646 99645->99106 99647 a81ac6 99646->99647 99660 a4859a 68 API calls 99647->99660 99649 a81ad7 99650 a81adb Mailbox 99649->99650 99661 a49e9c 60 API calls Mailbox 99649->99661 99650->99106 99653 a7f173 99652->99653 99654 a47e1f 99652->99654 99656 a48189 59 API calls 99653->99656 99662 a47db0 99654->99662 99658 a7f17e __NMSG_WRITE _memmove 99656->99658 99657 a47e2a 99657->99094 99659->99085 99660->99649 99661->99650 99663 a47dbf __NMSG_WRITE 99662->99663 99664 a48189 59 API calls 99663->99664 99665 a47dd0 _memmove 99663->99665 99666 a7f130 _memmove 99664->99666 99665->99657 99667->99125 99668->99122 99669->99138 99671 a4f7b0 99670->99671 99672 a4f61a 99670->99672 99675 a47f41 59 API calls 99671->99675 99673 a84848 99672->99673 99674 a4f626 99672->99674 99676 abbf80 331 API calls 99673->99676 99696 a4f3f0 99674->99696 99681 a4f6ec Mailbox 99675->99681 99678 a84856 99676->99678 99682 a4f790 99678->99682 99798 aaa0b5 89 API calls 4 library calls 99678->99798 99680 a4f65d 99680->99678 99680->99681 99680->99682 99684 a4f743 99681->99684 99685 ab474d 331 API calls 99681->99685 99686 aa3e73 3 API calls 99681->99686 99711 aacde5 99681->99711 99791 a44faa 99681->99791 99682->99125 99684->99682 99797 a49df0 59 API calls Mailbox 99684->99797 99685->99684 99686->99684 99689->99134 99690->99143 99691->99125 99692->99149 99693->99151 99694->99155 99695->99125 99697 a4f59a 99696->99697 99699 a4f41c 99696->99699 99800 aaa0b5 89 API calls 4 library calls 99697->99800 99699->99697 99708 a4f459 _memmove 99699->99708 99700 a4f533 99701 a4f543 99700->99701 99799 aba5ee 85 API calls Mailbox 99700->99799 99701->99680 99703 a60ff6 59 API calls Mailbox 99703->99708 99704 a84823 99802 a4f803 331 API calls 99704->99802 99705 a4a000 331 API calls 99705->99708 99707 a847d3 99707->99680 99708->99700 99708->99703 99708->99704 99708->99705 99708->99707 99709 a847d5 99708->99709 99801 aaa0b5 89 API calls 4 library calls 99709->99801 99712 a477c7 59 API calls 99711->99712 99713 aace1a 99712->99713 99714 a477c7 59 API calls 99713->99714 99715 aace23 99714->99715 99716 aace37 99715->99716 99717 a49c9c 59 API calls 99715->99717 99718 a49997 84 API calls 99716->99718 99717->99716 99719 aace54 99718->99719 99720 aace76 99719->99720 99721 aacf55 99719->99721 99733 aacf85 Mailbox 99719->99733 99722 a49997 84 API calls 99720->99722 99803 a44f3d 99721->99803 99724 aace82 99722->99724 99726 a481a7 59 API calls 99724->99726 99729 aace8e 99726->99729 99727 aacf81 99728 a477c7 59 API calls 99727->99728 99727->99733 99731 aacfb6 99728->99731 99735 aacea2 99729->99735 99736 aaced4 99729->99736 99730 a44f3d 136 API calls 99730->99727 99732 a477c7 59 API calls 99731->99732 99734 aacfbf 99732->99734 99733->99684 99738 a477c7 59 API calls 99734->99738 99739 a481a7 59 API calls 99735->99739 99737 a49997 84 API calls 99736->99737 99740 aacee1 99737->99740 99741 aacfc8 99738->99741 99742 aaceb2 99739->99742 99743 a481a7 59 API calls 99740->99743 99744 a477c7 59 API calls 99741->99744 99745 a47e0b 59 API calls 99742->99745 99747 aaceed 99743->99747 99748 aacfd1 99744->99748 99746 aacebc 99745->99746 99749 a49997 84 API calls 99746->99749 99936 aa4cd3 GetFileAttributesW 99747->99936 99751 a49997 84 API calls 99748->99751 99752 aacec8 99749->99752 99754 aacfde 99751->99754 99755 a47c8e 59 API calls 99752->99755 99753 aacef6 99756 aacf09 99753->99756 99759 a47b52 59 API calls 99753->99759 99757 a446f9 59 API calls 99754->99757 99755->99736 99758 a49997 84 API calls 99756->99758 99766 aacf0f 99756->99766 99760 aacff9 99757->99760 99761 aacf36 99758->99761 99759->99756 99762 a47b52 59 API calls 99760->99762 99937 aa3a2b 75 API calls Mailbox 99761->99937 99763 aad008 99762->99763 99765 aad03c 99763->99765 99767 a47b52 59 API calls 99763->99767 99768 a481a7 59 API calls 99765->99768 99766->99733 99769 aad019 99767->99769 99770 aad04a 99768->99770 99769->99765 99772 a47d2c 59 API calls 99769->99772 99771 a47c8e 59 API calls 99770->99771 99773 aad058 99771->99773 99774 aad02e 99772->99774 99775 a47c8e 59 API calls 99773->99775 99776 a47d2c 59 API calls 99774->99776 99777 aad066 99775->99777 99776->99765 99778 a47c8e 59 API calls 99777->99778 99779 aad074 99778->99779 99780 a49997 84 API calls 99779->99780 99781 aad080 99780->99781 99827 aa42ad 99781->99827 99783 aad091 99784 aa3e73 3 API calls 99783->99784 99785 aad09b 99784->99785 99786 a49997 84 API calls 99785->99786 99790 aad0cc 99785->99790 99787 aad0b9 99786->99787 99881 aa93df 99787->99881 99789 a44faa 84 API calls 99789->99733 99790->99789 99792 a44fb4 99791->99792 99793 a44fbb 99791->99793 99794 a655d6 __fcloseall 83 API calls 99792->99794 99795 a44fca 99793->99795 99796 a44fdb FreeLibrary 99793->99796 99794->99793 99795->99684 99796->99795 99797->99684 99798->99682 99799->99701 99800->99707 99801->99707 99802->99707 99938 a44d13 99803->99938 99808 a7dd0f 99811 a44faa 84 API calls 99808->99811 99809 a44f68 LoadLibraryExW 99948 a44cc8 99809->99948 99813 a7dd16 99811->99813 99815 a44cc8 3 API calls 99813->99815 99817 a7dd1e 99815->99817 99816 a44f8f 99816->99817 99818 a44f9b 99816->99818 99974 a4506b 99817->99974 99820 a44faa 84 API calls 99818->99820 99822 a44fa0 99820->99822 99822->99727 99822->99730 99824 a7dd45 99982 a45027 99824->99982 99828 aa42c9 99827->99828 99829 aa42ce 99828->99829 99830 aa42dc 99828->99830 99832 a481a7 59 API calls 99829->99832 99831 a477c7 59 API calls 99830->99831 99833 aa42e4 99831->99833 99834 aa42d7 Mailbox 99832->99834 99835 a477c7 59 API calls 99833->99835 99834->99783 99836 aa42ec 99835->99836 99837 a477c7 59 API calls 99836->99837 99838 aa42f7 99837->99838 99839 a477c7 59 API calls 99838->99839 99840 aa42ff 99839->99840 99841 a477c7 59 API calls 99840->99841 99842 aa4307 99841->99842 99843 a477c7 59 API calls 99842->99843 99844 aa430f 99843->99844 99845 a477c7 59 API calls 99844->99845 99846 aa4317 99845->99846 99847 a477c7 59 API calls 99846->99847 99848 aa431f 99847->99848 99849 a446f9 59 API calls 99848->99849 99850 aa4336 99849->99850 99851 a446f9 59 API calls 99850->99851 99852 aa434f 99851->99852 99853 a47b52 59 API calls 99852->99853 99854 aa435b 99853->99854 99855 aa436e 99854->99855 99856 a47e8c 59 API calls 99854->99856 99857 a47b52 59 API calls 99855->99857 99856->99855 99858 aa4377 99857->99858 99859 aa4387 99858->99859 99860 a47e8c 59 API calls 99858->99860 99861 a481a7 59 API calls 99859->99861 99860->99859 99862 aa4393 99861->99862 99863 a47c8e 59 API calls 99862->99863 99864 aa439f 99863->99864 100409 aa445f 59 API calls 99864->100409 99866 aa43ae 100410 aa445f 59 API calls 99866->100410 99868 aa43c1 99869 a47b52 59 API calls 99868->99869 99870 aa43cb 99869->99870 99871 aa43e2 99870->99871 99872 aa43d0 99870->99872 99874 a47b52 59 API calls 99871->99874 99873 a47e0b 59 API calls 99872->99873 99875 aa43dd 99873->99875 99876 aa43eb 99874->99876 99878 a47c8e 59 API calls 99875->99878 99877 aa4409 99876->99877 99880 a47e0b 59 API calls 99876->99880 99879 a47c8e 59 API calls 99877->99879 99878->99877 99879->99834 99880->99875 99882 aa93ec __write_nolock 99881->99882 99883 a60ff6 Mailbox 59 API calls 99882->99883 99884 aa9449 99883->99884 99885 a4538e 59 API calls 99884->99885 99886 aa9453 99885->99886 99887 aa91e9 GetSystemTimeAsFileTime 99886->99887 99888 aa945e 99887->99888 99889 a45045 85 API calls 99888->99889 99890 aa9471 _wcscmp 99889->99890 99891 aa9542 99890->99891 99892 aa9495 99890->99892 99893 aa99be 96 API calls 99891->99893 100441 aa99be 99892->100441 99895 aa950e _wcscat 99893->99895 99898 a4506b 74 API calls 99895->99898 99900 aa954b 99895->99900 99899 aa9567 99898->99899 99901 a4506b 74 API calls 99899->99901 99900->99790 99903 aa9577 99901->99903 99902 aa94c3 _wcscat _wcscpy 100448 a6432e 58 API calls __wsplitpath_helper 99902->100448 99904 a4506b 74 API calls 99903->99904 99906 aa9592 99904->99906 99907 a4506b 74 API calls 99906->99907 99908 aa95a2 99907->99908 99909 a4506b 74 API calls 99908->99909 99910 aa95bd 99909->99910 99911 a4506b 74 API calls 99910->99911 99912 aa95cd 99911->99912 99913 a4506b 74 API calls 99912->99913 99914 aa95dd 99913->99914 99915 a4506b 74 API calls 99914->99915 99916 aa95ed 99915->99916 100411 aa9b6d GetTempPathW GetTempFileNameW 99916->100411 99918 aa95f9 99919 a6548b 115 API calls 99918->99919 99929 aa960a 99919->99929 99920 aa96c4 100425 a655d6 99920->100425 99922 aa96cf 99923 a4506b 74 API calls 99923->99929 99929->99900 99929->99920 99929->99923 100412 a64a93 99929->100412 99936->99753 99937->99766 99987 a44d61 99938->99987 99941 a44d3a 99943 a44d53 99941->99943 99944 a44d4a FreeLibrary 99941->99944 99942 a44d61 2 API calls 99942->99941 99945 a6548b 99943->99945 99944->99943 99991 a654a0 99945->99991 99947 a44f5c 99947->99808 99947->99809 100149 a44d94 99948->100149 99951 a44d94 2 API calls 99954 a44ced 99951->99954 99952 a44cff FreeLibrary 99953 a44d08 99952->99953 99955 a44dd0 99953->99955 99954->99952 99954->99953 99956 a60ff6 Mailbox 59 API calls 99955->99956 99957 a44de5 99956->99957 99958 a4538e 59 API calls 99957->99958 99959 a44df1 _memmove 99958->99959 99960 a44e2c 99959->99960 99962 a44f21 99959->99962 99963 a44ee9 99959->99963 99961 a45027 69 API calls 99960->99961 99971 a44e35 99961->99971 100164 aa9ba5 95 API calls 99962->100164 100153 a44fe9 CreateStreamOnHGlobal 99963->100153 99966 a4506b 74 API calls 99966->99971 99968 a44ec9 99968->99816 99969 a7dcd0 99970 a45045 85 API calls 99969->99970 99972 a7dce4 99970->99972 99971->99966 99971->99968 99971->99969 100159 a45045 99971->100159 99973 a4506b 74 API calls 99972->99973 99973->99968 99975 a7ddf6 99974->99975 99976 a4507d 99974->99976 100188 a65812 99976->100188 99979 aa9393 100386 aa91e9 99979->100386 99981 aa93a9 99981->99824 99983 a45036 99982->99983 99984 a7ddb9 99982->99984 100391 a65e90 99983->100391 99986 a4503e 99988 a44d2e 99987->99988 99989 a44d6a LoadLibraryA 99987->99989 99988->99941 99988->99942 99989->99988 99990 a44d7b GetProcAddress 99989->99990 99990->99988 99994 a654ac _fprintf 99991->99994 99992 a654bf 100040 a68d68 58 API calls __getptd_noexit 99992->100040 99994->99992 99996 a654f0 99994->99996 99995 a654c4 100041 a68ff6 9 API calls _fprintf 99995->100041 100010 a70738 99996->100010 99999 a654f5 100000 a654fe 99999->100000 100001 a6550b 99999->100001 100042 a68d68 58 API calls __getptd_noexit 100000->100042 100003 a65535 100001->100003 100004 a65515 100001->100004 100025 a70857 100003->100025 100043 a68d68 58 API calls __getptd_noexit 100004->100043 100009 a654cf @_EH4_CallFilterFunc@8 _fprintf 100009->99947 100011 a70744 _fprintf 100010->100011 100012 a69e4b __lock 58 API calls 100011->100012 100023 a70752 100012->100023 100013 a707c6 100045 a7084e 100013->100045 100014 a707cd 100050 a68a5d 58 API calls 2 library calls 100014->100050 100017 a707d4 100017->100013 100051 a6a06b InitializeCriticalSectionAndSpinCount 100017->100051 100018 a70843 _fprintf 100018->99999 100020 a69ed3 __mtinitlocknum 58 API calls 100020->100023 100022 a707fa EnterCriticalSection 100022->100013 100023->100013 100023->100014 100023->100020 100048 a66e8d 59 API calls __lock 100023->100048 100049 a66ef7 LeaveCriticalSection LeaveCriticalSection _doexit 100023->100049 100026 a70877 __wopenfile 100025->100026 100027 a70891 100026->100027 100039 a70a4c 100026->100039 100058 a63a0b 60 API calls 2 library calls 100026->100058 100056 a68d68 58 API calls __getptd_noexit 100027->100056 100029 a70896 100057 a68ff6 9 API calls _fprintf 100029->100057 100031 a70aaf 100053 a787f1 100031->100053 100032 a65540 100044 a65562 LeaveCriticalSection LeaveCriticalSection _fprintf 100032->100044 100035 a70a45 100035->100039 100059 a63a0b 60 API calls 2 library calls 100035->100059 100037 a70a64 100037->100039 100060 a63a0b 60 API calls 2 library calls 100037->100060 100039->100027 100039->100031 100040->99995 100041->100009 100042->100009 100043->100009 100044->100009 100052 a69fb5 LeaveCriticalSection 100045->100052 100047 a70855 100047->100018 100048->100023 100049->100023 100050->100017 100051->100022 100052->100047 100061 a77fd5 100053->100061 100055 a7880a 100055->100032 100056->100029 100057->100032 100058->100035 100059->100037 100060->100039 100062 a77fe1 _fprintf 100061->100062 100063 a77ff7 100062->100063 100065 a7802d 100062->100065 100146 a68d68 58 API calls __getptd_noexit 100063->100146 100072 a7809e 100065->100072 100066 a77ffc 100147 a68ff6 9 API calls _fprintf 100066->100147 100069 a78049 100148 a78072 LeaveCriticalSection __unlock_fhandle 100069->100148 100070 a78006 _fprintf 100070->100055 100073 a780be 100072->100073 100074 a6471a __wsopen_nolock 58 API calls 100073->100074 100077 a780da 100074->100077 100075 a69006 __invoke_watson 8 API calls 100076 a787f0 100075->100076 100078 a77fd5 __wsopen_helper 103 API calls 100076->100078 100079 a78114 100077->100079 100083 a78137 100077->100083 100095 a78211 100077->100095 100080 a7880a 100078->100080 100081 a68d34 __dosmaperr 58 API calls 100079->100081 100080->100069 100082 a78119 100081->100082 100084 a68d68 _fprintf 58 API calls 100082->100084 100086 a781f5 100083->100086 100094 a781d3 100083->100094 100085 a78126 100084->100085 100087 a68ff6 _fprintf 9 API calls 100085->100087 100088 a68d34 __dosmaperr 58 API calls 100086->100088 100089 a78130 100087->100089 100090 a781fa 100088->100090 100089->100069 100091 a68d68 _fprintf 58 API calls 100090->100091 100092 a78207 100091->100092 100093 a68ff6 _fprintf 9 API calls 100092->100093 100093->100095 100096 a6d4d4 __alloc_osfhnd 61 API calls 100094->100096 100095->100075 100097 a782a1 100096->100097 100098 a782ce 100097->100098 100099 a782ab 100097->100099 100100 a77f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100098->100100 100101 a68d34 __dosmaperr 58 API calls 100099->100101 100111 a782f0 100100->100111 100102 a782b0 100101->100102 100103 a68d68 _fprintf 58 API calls 100102->100103 100105 a782ba 100103->100105 100104 a7836e GetFileType 100106 a783bb 100104->100106 100107 a78379 GetLastError 100104->100107 100109 a68d68 _fprintf 58 API calls 100105->100109 100118 a6d76a __set_osfhnd 59 API calls 100106->100118 100110 a68d47 __dosmaperr 58 API calls 100107->100110 100108 a7833c GetLastError 100112 a68d47 __dosmaperr 58 API calls 100108->100112 100109->100089 100113 a783a0 CloseHandle 100110->100113 100111->100104 100111->100108 100114 a77f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100111->100114 100115 a78361 100112->100115 100113->100115 100116 a783ae 100113->100116 100117 a78331 100114->100117 100119 a68d68 _fprintf 58 API calls 100115->100119 100120 a68d68 _fprintf 58 API calls 100116->100120 100117->100104 100117->100108 100123 a783d9 100118->100123 100119->100095 100121 a783b3 100120->100121 100121->100115 100122 a78594 100122->100095 100125 a78767 CloseHandle 100122->100125 100123->100122 100124 a71b11 __lseeki64_nolock 60 API calls 100123->100124 100140 a7845a 100123->100140 100126 a78443 100124->100126 100127 a77f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100125->100127 100129 a68d34 __dosmaperr 58 API calls 100126->100129 100126->100140 100128 a7878e 100127->100128 100130 a78796 GetLastError 100128->100130 100131 a787c2 100128->100131 100129->100140 100132 a68d47 __dosmaperr 58 API calls 100130->100132 100131->100095 100134 a787a2 100132->100134 100133 a7848c 100137 a799f2 __chsize_nolock 82 API calls 100133->100137 100133->100140 100138 a6d67d __free_osfhnd 59 API calls 100134->100138 100135 a70d2d __close_nolock 61 API calls 100135->100140 100136 a710ab 70 API calls __read_nolock 100136->100140 100137->100133 100138->100131 100139 a6dac6 __write 78 API calls 100139->100140 100140->100122 100140->100133 100140->100135 100140->100136 100140->100139 100141 a78611 100140->100141 100142 a71b11 60 API calls __lseeki64_nolock 100140->100142 100143 a70d2d __close_nolock 61 API calls 100141->100143 100142->100140 100144 a78618 100143->100144 100145 a68d68 _fprintf 58 API calls 100144->100145 100145->100095 100146->100066 100147->100070 100148->100070 100150 a44ce1 100149->100150 100151 a44d9d LoadLibraryA 100149->100151 100150->99951 100150->99954 100151->100150 100152 a44dae GetProcAddress 100151->100152 100152->100150 100154 a45003 FindResourceExW 100153->100154 100158 a45020 100153->100158 100155 a7dd5c LoadResource 100154->100155 100154->100158 100156 a7dd71 SizeofResource 100155->100156 100155->100158 100157 a7dd85 LockResource 100156->100157 100156->100158 100157->100158 100158->99960 100160 a45054 100159->100160 100161 a7ddd4 100159->100161 100165 a65a7d 100160->100165 100163 a45062 100163->99971 100164->99960 100167 a65a89 _fprintf 100165->100167 100166 a65a9b 100178 a68d68 58 API calls __getptd_noexit 100166->100178 100167->100166 100168 a65ac1 100167->100168 100180 a66e4e 100168->100180 100171 a65aa0 100179 a68ff6 9 API calls _fprintf 100171->100179 100175 a65ad6 100187 a65af8 LeaveCriticalSection LeaveCriticalSection _fprintf 100175->100187 100177 a65aab _fprintf 100177->100163 100178->100171 100179->100177 100181 a66e80 EnterCriticalSection 100180->100181 100182 a66e5e 100180->100182 100183 a65ac7 100181->100183 100182->100181 100184 a66e66 100182->100184 100186 a659ee 83 API calls 4 library calls 100183->100186 100185 a69e4b __lock 58 API calls 100184->100185 100185->100183 100186->100175 100187->100177 100191 a6582d 100188->100191 100190 a4508e 100190->99979 100192 a65839 _fprintf 100191->100192 100193 a6584f _memset 100192->100193 100194 a6587c 100192->100194 100195 a65874 _fprintf 100192->100195 100218 a68d68 58 API calls __getptd_noexit 100193->100218 100196 a66e4e __lock_file 59 API calls 100194->100196 100195->100190 100197 a65882 100196->100197 100204 a6564d 100197->100204 100200 a65869 100219 a68ff6 9 API calls _fprintf 100200->100219 100205 a65683 100204->100205 100208 a65668 _memset 100204->100208 100220 a658b6 LeaveCriticalSection LeaveCriticalSection _fprintf 100205->100220 100206 a65673 100316 a68d68 58 API calls __getptd_noexit 100206->100316 100208->100205 100208->100206 100210 a656c3 100208->100210 100210->100205 100212 a657d4 _memset 100210->100212 100221 a64916 100210->100221 100228 a710ab 100210->100228 100296 a70df7 100210->100296 100318 a70f18 58 API calls 3 library calls 100210->100318 100319 a68d68 58 API calls __getptd_noexit 100212->100319 100217 a65678 100317 a68ff6 9 API calls _fprintf 100217->100317 100218->100200 100219->100195 100220->100195 100222 a64935 100221->100222 100223 a64920 100221->100223 100222->100210 100320 a68d68 58 API calls __getptd_noexit 100223->100320 100225 a64925 100321 a68ff6 9 API calls _fprintf 100225->100321 100227 a64930 100227->100210 100229 a710e3 100228->100229 100230 a710cc 100228->100230 100232 a7181b 100229->100232 100236 a7111d 100229->100236 100331 a68d34 58 API calls __getptd_noexit 100230->100331 100347 a68d34 58 API calls __getptd_noexit 100232->100347 100233 a710d1 100332 a68d68 58 API calls __getptd_noexit 100233->100332 100238 a71125 100236->100238 100245 a7113c 100236->100245 100237 a71820 100348 a68d68 58 API calls __getptd_noexit 100237->100348 100333 a68d34 58 API calls __getptd_noexit 100238->100333 100240 a71131 100349 a68ff6 9 API calls _fprintf 100240->100349 100242 a7112a 100334 a68d68 58 API calls __getptd_noexit 100242->100334 100244 a71151 100335 a68d34 58 API calls __getptd_noexit 100244->100335 100245->100244 100247 a7116b 100245->100247 100249 a71189 100245->100249 100276 a710d8 100245->100276 100247->100244 100253 a71176 100247->100253 100336 a68a5d 58 API calls 2 library calls 100249->100336 100251 a71199 100254 a711a1 100251->100254 100255 a711bc 100251->100255 100322 a75ebb 100253->100322 100337 a68d68 58 API calls __getptd_noexit 100254->100337 100339 a71b11 60 API calls 3 library calls 100255->100339 100256 a7128a 100258 a71303 ReadFile 100256->100258 100263 a712a0 GetConsoleMode 100256->100263 100261 a71325 100258->100261 100262 a717e3 GetLastError 100258->100262 100260 a711a6 100338 a68d34 58 API calls __getptd_noexit 100260->100338 100261->100262 100269 a712f5 100261->100269 100265 a712e3 100262->100265 100266 a717f0 100262->100266 100267 a712b4 100263->100267 100268 a71300 100263->100268 100278 a712e9 100265->100278 100340 a68d47 58 API calls 2 library calls 100265->100340 100345 a68d68 58 API calls __getptd_noexit 100266->100345 100267->100268 100271 a712ba ReadConsoleW 100267->100271 100268->100258 100269->100278 100279 a7135a 100269->100279 100288 a715c7 100269->100288 100271->100269 100273 a712dd GetLastError 100271->100273 100272 a717f5 100346 a68d34 58 API calls __getptd_noexit 100272->100346 100273->100265 100276->100210 100277 a62f95 _free 58 API calls 100277->100276 100278->100276 100278->100277 100280 a713c6 ReadFile 100279->100280 100286 a71447 100279->100286 100282 a713e7 GetLastError 100280->100282 100293 a713f1 100280->100293 100282->100293 100283 a71504 100291 a714b4 MultiByteToWideChar 100283->100291 100343 a71b11 60 API calls 3 library calls 100283->100343 100284 a714f4 100342 a68d68 58 API calls __getptd_noexit 100284->100342 100285 a716cd ReadFile 100289 a716f0 GetLastError 100285->100289 100290 a716fe 100285->100290 100286->100278 100286->100283 100286->100284 100286->100291 100288->100278 100288->100285 100289->100290 100290->100288 100344 a71b11 60 API calls 3 library calls 100290->100344 100291->100273 100291->100278 100293->100279 100341 a71b11 60 API calls 3 library calls 100293->100341 100297 a70e02 100296->100297 100301 a70e17 100296->100301 100383 a68d68 58 API calls __getptd_noexit 100297->100383 100299 a70e07 100384 a68ff6 9 API calls _fprintf 100299->100384 100302 a70e4c 100301->100302 100309 a70e12 100301->100309 100385 a76234 58 API calls __malloc_crt 100301->100385 100304 a64916 _fprintf 58 API calls 100302->100304 100305 a70e60 100304->100305 100350 a70f97 100305->100350 100307 a70e67 100308 a64916 _fprintf 58 API calls 100307->100308 100307->100309 100310 a70e8a 100308->100310 100309->100210 100310->100309 100311 a64916 _fprintf 58 API calls 100310->100311 100312 a70e96 100311->100312 100312->100309 100313 a64916 _fprintf 58 API calls 100312->100313 100314 a70ea3 100313->100314 100315 a64916 _fprintf 58 API calls 100314->100315 100315->100309 100316->100217 100317->100205 100318->100210 100319->100217 100320->100225 100321->100227 100323 a75ec6 100322->100323 100324 a75ed3 100322->100324 100325 a68d68 _fprintf 58 API calls 100323->100325 100327 a75edf 100324->100327 100328 a68d68 _fprintf 58 API calls 100324->100328 100326 a75ecb 100325->100326 100326->100256 100327->100256 100329 a75f00 100328->100329 100330 a68ff6 _fprintf 9 API calls 100329->100330 100330->100326 100331->100233 100332->100276 100333->100242 100334->100240 100335->100242 100336->100251 100337->100260 100338->100276 100339->100253 100340->100278 100341->100293 100342->100278 100343->100291 100344->100290 100345->100272 100346->100278 100347->100237 100348->100240 100349->100276 100351 a70fa3 _fprintf 100350->100351 100352 a70fc7 100351->100352 100353 a70fb0 100351->100353 100355 a7108b 100352->100355 100358 a70fdb 100352->100358 100354 a68d34 __dosmaperr 58 API calls 100353->100354 100357 a70fb5 100354->100357 100356 a68d34 __dosmaperr 58 API calls 100355->100356 100361 a70ffe 100356->100361 100362 a68d68 _fprintf 58 API calls 100357->100362 100359 a71006 100358->100359 100360 a70ff9 100358->100360 100364 a71013 100359->100364 100365 a71028 100359->100365 100363 a68d34 __dosmaperr 58 API calls 100360->100363 100368 a68d68 _fprintf 58 API calls 100361->100368 100372 a70fbc _fprintf 100362->100372 100363->100361 100366 a68d34 __dosmaperr 58 API calls 100364->100366 100367 a6d446 ___lock_fhandle 59 API calls 100365->100367 100369 a71018 100366->100369 100370 a7102e 100367->100370 100371 a71020 100368->100371 100373 a68d68 _fprintf 58 API calls 100369->100373 100374 a71054 100370->100374 100375 a71041 100370->100375 100378 a68ff6 _fprintf 9 API calls 100371->100378 100372->100307 100373->100371 100376 a68d68 _fprintf 58 API calls 100374->100376 100377 a710ab __read_nolock 70 API calls 100375->100377 100379 a71059 100376->100379 100380 a7104d 100377->100380 100378->100372 100381 a68d34 __dosmaperr 58 API calls 100379->100381 100382 a71083 __read LeaveCriticalSection 100380->100382 100381->100380 100382->100372 100383->100299 100384->100309 100385->100302 100389 a6543a GetSystemTimeAsFileTime 100386->100389 100388 aa91f8 100388->99981 100390 a65468 __aulldiv 100389->100390 100390->100388 100392 a65e9c _fprintf 100391->100392 100393 a65ec3 100392->100393 100394 a65eae 100392->100394 100396 a66e4e __lock_file 59 API calls 100393->100396 100405 a68d68 58 API calls __getptd_noexit 100394->100405 100397 a65ec9 100396->100397 100407 a65b00 67 API calls 5 library calls 100397->100407 100398 a65eb3 100406 a68ff6 9 API calls _fprintf 100398->100406 100401 a65ed4 100408 a65ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 100401->100408 100402 a65ebe _fprintf 100402->99986 100404 a65ee6 100404->100402 100405->100398 100406->100402 100407->100401 100408->100404 100409->99866 100410->99868 100411->99918 100413 a64a9f _fprintf 100412->100413 100414 a64ad5 100413->100414 100415 a64abd 100413->100415 100416 a64acd _fprintf 100413->100416 100417 a66e4e __lock_file 59 API calls 100414->100417 100492 a68d68 58 API calls __getptd_noexit 100415->100492 100416->99929 100419 a64adb 100417->100419 100480 a6493a 100419->100480 100420 a64ac2 100426 a655e2 _fprintf 100425->100426 100427 a655f6 100426->100427 100428 a6560e 100426->100428 100654 a68d68 58 API calls __getptd_noexit 100427->100654 100430 a66e4e __lock_file 59 API calls 100428->100430 100434 a65606 _fprintf 100428->100434 100434->99922 100446 aa99d2 __tzset_nolock _wcscmp 100441->100446 100442 aa949a 100442->99900 100447 a6432e 58 API calls __wsplitpath_helper 100442->100447 100443 a4506b 74 API calls 100443->100446 100444 aa9393 GetSystemTimeAsFileTime 100444->100446 100445 a45045 85 API calls 100445->100446 100446->100442 100446->100443 100446->100444 100446->100445 100447->99902 100448->99895 100492->100420 100775 a9665e 100774->100775 100776 a96641 100774->100776 100775->99159 100776->100775 100778 a96621 59 API calls Mailbox 100776->100778 100778->100776 100779 a41016 100784 a44ad2 100779->100784 100782 a62f80 __cinit 67 API calls 100783 a41025 100782->100783 100785 a60ff6 Mailbox 59 API calls 100784->100785 100786 a44ada 100785->100786 100787 a4101b 100786->100787 100791 a44a94 100786->100791 100787->100782 100792 a44a9d 100791->100792 100794 a44aaf 100791->100794 100793 a62f80 __cinit 67 API calls 100792->100793 100793->100794 100795 a44afe 100794->100795 100796 a477c7 59 API calls 100795->100796 100797 a44b16 GetVersionExW 100796->100797 100798 a47d2c 59 API calls 100797->100798 100799 a44b59 100798->100799 100800 a47e8c 59 API calls 100799->100800 100803 a44b86 100799->100803 100801 a44b7a 100800->100801 100823 a47886 100801->100823 100804 a44bf1 GetCurrentProcess IsWow64Process 100803->100804 100806 a7dc8d 100803->100806 100805 a44c0a 100804->100805 100807 a44c20 100805->100807 100808 a44c89 GetSystemInfo 100805->100808 100819 a44c95 100807->100819 100809 a44c56 100808->100809 100809->100787 100812 a44c32 100815 a44c95 2 API calls 100812->100815 100813 a44c7d GetSystemInfo 100814 a44c47 100813->100814 100814->100809 100817 a44c4d FreeLibrary 100814->100817 100816 a44c3a GetNativeSystemInfo 100815->100816 100816->100814 100817->100809 100820 a44c2e 100819->100820 100821 a44c9e LoadLibraryA 100819->100821 100820->100812 100820->100813 100821->100820 100822 a44caf GetProcAddress 100821->100822 100822->100820 100824 a47894 100823->100824 100825 a47e8c 59 API calls 100824->100825 100826 a478a4 100825->100826 100826->100803 100827 a41066 100832 a4f8cf 100827->100832 100829 a4106c 100830 a62f80 __cinit 67 API calls 100829->100830 100831 a41076 100830->100831 100833 a4f8f0 100832->100833 100865 a60143 100833->100865 100837 a4f937 100838 a477c7 59 API calls 100837->100838 100839 a4f941 100838->100839 100840 a477c7 59 API calls 100839->100840 100841 a4f94b 100840->100841 100842 a477c7 59 API calls 100841->100842 100843 a4f955 100842->100843 100844 a477c7 59 API calls 100843->100844 100845 a4f993 100844->100845 100846 a477c7 59 API calls 100845->100846 100847 a4fa5e 100846->100847 100875 a560e7 100847->100875 100851 a4fa90 100852 a477c7 59 API calls 100851->100852 100853 a4fa9a 100852->100853 100903 a5ffde 100853->100903 100855 a4fae1 100856 a4faf1 GetStdHandle 100855->100856 100857 a4fb3d 100856->100857 100858 a849d5 100856->100858 100859 a4fb45 OleInitialize 100857->100859 100858->100857 100860 a849de 100858->100860 100859->100829 100910 aa6dda 64 API calls Mailbox 100860->100910 100862 a849e5 100911 aa74a9 CreateThread 100862->100911 100864 a849f1 CloseHandle 100864->100859 100912 a6021c 100865->100912 100868 a6021c 59 API calls 100869 a60185 100868->100869 100870 a477c7 59 API calls 100869->100870 100871 a60191 100870->100871 100872 a47d2c 59 API calls 100871->100872 100873 a4f8f6 100872->100873 100874 a603a2 6 API calls 100873->100874 100874->100837 100876 a477c7 59 API calls 100875->100876 100877 a560f7 100876->100877 100878 a477c7 59 API calls 100877->100878 100879 a560ff 100878->100879 100919 a55bfd 100879->100919 100882 a55bfd 59 API calls 100883 a5610f 100882->100883 100884 a477c7 59 API calls 100883->100884 100885 a5611a 100884->100885 100886 a60ff6 Mailbox 59 API calls 100885->100886 100887 a4fa68 100886->100887 100888 a56259 100887->100888 100889 a56267 100888->100889 100890 a477c7 59 API calls 100889->100890 100891 a56272 100890->100891 100892 a477c7 59 API calls 100891->100892 100893 a5627d 100892->100893 100894 a477c7 59 API calls 100893->100894 100895 a56288 100894->100895 100896 a477c7 59 API calls 100895->100896 100897 a56293 100896->100897 100898 a55bfd 59 API calls 100897->100898 100899 a5629e 100898->100899 100900 a60ff6 Mailbox 59 API calls 100899->100900 100901 a562a5 RegisterWindowMessageW 100900->100901 100901->100851 100904 a95cc3 100903->100904 100905 a5ffee 100903->100905 100922 aa9d71 60 API calls 100904->100922 100906 a60ff6 Mailbox 59 API calls 100905->100906 100908 a5fff6 100906->100908 100908->100855 100909 a95cce 100910->100862 100911->100864 100923 aa748f 65 API calls 100911->100923 100913 a477c7 59 API calls 100912->100913 100914 a60227 100913->100914 100915 a477c7 59 API calls 100914->100915 100916 a6022f 100915->100916 100917 a477c7 59 API calls 100916->100917 100918 a6017b 100917->100918 100918->100868 100920 a477c7 59 API calls 100919->100920 100921 a55c05 100920->100921 100921->100882 100922->100909 100924 a67e93 100925 a67e9f _fprintf 100924->100925 100961 a6a048 GetStartupInfoW 100925->100961 100927 a67ea4 100963 a68dbc GetProcessHeap 100927->100963 100929 a67efc 100930 a67f07 100929->100930 101046 a67fe3 58 API calls 3 library calls 100929->101046 100964 a69d26 100930->100964 100933 a67f0d 100934 a67f18 __RTC_Initialize 100933->100934 101047 a67fe3 58 API calls 3 library calls 100933->101047 100985 a6d812 100934->100985 100937 a67f27 100938 a67f33 GetCommandLineW 100937->100938 101048 a67fe3 58 API calls 3 library calls 100937->101048 101004 a75173 GetEnvironmentStringsW 100938->101004 100941 a67f32 100941->100938 100944 a67f4d 100945 a67f58 100944->100945 101049 a632f5 58 API calls 3 library calls 100944->101049 101014 a74fa8 100945->101014 100948 a67f5e 100949 a67f69 100948->100949 101050 a632f5 58 API calls 3 library calls 100948->101050 101028 a6332f 100949->101028 100952 a67f71 100953 a67f7c __wwincmdln 100952->100953 101051 a632f5 58 API calls 3 library calls 100952->101051 101034 a4492e 100953->101034 100956 a67f90 100957 a67f9f 100956->100957 101052 a63598 58 API calls _doexit 100956->101052 101053 a63320 58 API calls _doexit 100957->101053 100960 a67fa4 _fprintf 100962 a6a05e 100961->100962 100962->100927 100963->100929 101054 a633c7 36 API calls 2 library calls 100964->101054 100966 a69d2b 101055 a69f7c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 100966->101055 100968 a69d30 100969 a69d34 100968->100969 101057 a69fca TlsAlloc 100968->101057 101056 a69d9c 61 API calls 2 library calls 100969->101056 100972 a69d39 100972->100933 100973 a69d46 100973->100969 100974 a69d51 100973->100974 101058 a68a15 100974->101058 100977 a69d93 101066 a69d9c 61 API calls 2 library calls 100977->101066 100980 a69d72 100980->100977 100982 a69d78 100980->100982 100981 a69d98 100981->100933 101065 a69c73 58 API calls 4 library calls 100982->101065 100984 a69d80 GetCurrentThreadId 100984->100933 100986 a6d81e _fprintf 100985->100986 100987 a69e4b __lock 58 API calls 100986->100987 100988 a6d825 100987->100988 100989 a68a15 __calloc_crt 58 API calls 100988->100989 100990 a6d836 100989->100990 100991 a6d8a1 GetStartupInfoW 100990->100991 100992 a6d841 @_EH4_CallFilterFunc@8 _fprintf 100990->100992 100998 a6d8b6 100991->100998 101001 a6d9e5 100991->101001 100992->100937 100993 a6daad 101080 a6dabd LeaveCriticalSection _doexit 100993->101080 100995 a68a15 __calloc_crt 58 API calls 100995->100998 100996 a6da32 GetStdHandle 100996->101001 100997 a6da45 GetFileType 100997->101001 100998->100995 100999 a6d904 100998->100999 100998->101001 101000 a6d938 GetFileType 100999->101000 100999->101001 101078 a6a06b InitializeCriticalSectionAndSpinCount 100999->101078 101000->100999 101001->100993 101001->100996 101001->100997 101079 a6a06b InitializeCriticalSectionAndSpinCount 101001->101079 101005 a67f43 101004->101005 101006 a75184 101004->101006 101010 a74d6b GetModuleFileNameW 101005->101010 101081 a68a5d 58 API calls 2 library calls 101006->101081 101008 a751aa _memmove 101009 a751c0 FreeEnvironmentStringsW 101008->101009 101009->101005 101011 a74d9f _wparse_cmdline 101010->101011 101013 a74ddf _wparse_cmdline 101011->101013 101082 a68a5d 58 API calls 2 library calls 101011->101082 101013->100944 101015 a74fb9 101014->101015 101017 a74fc1 __NMSG_WRITE 101014->101017 101015->100948 101016 a68a15 __calloc_crt 58 API calls 101024 a74fea __NMSG_WRITE 101016->101024 101017->101016 101018 a75041 101019 a62f95 _free 58 API calls 101018->101019 101019->101015 101020 a68a15 __calloc_crt 58 API calls 101020->101024 101021 a75066 101022 a62f95 _free 58 API calls 101021->101022 101022->101015 101024->101015 101024->101018 101024->101020 101024->101021 101025 a7507d 101024->101025 101083 a74857 58 API calls _fprintf 101024->101083 101084 a69006 IsProcessorFeaturePresent 101025->101084 101027 a75089 101027->100948 101029 a6333b __IsNonwritableInCurrentImage 101028->101029 101099 a6a711 101029->101099 101031 a63359 __initterm_e 101032 a62f80 __cinit 67 API calls 101031->101032 101033 a63378 __cinit __IsNonwritableInCurrentImage 101031->101033 101032->101033 101033->100952 101035 a44948 101034->101035 101045 a449e7 101034->101045 101036 a44982 IsThemeActive 101035->101036 101102 a635ac 101036->101102 101040 a449ae 101114 a44a5b SystemParametersInfoW SystemParametersInfoW 101040->101114 101042 a449ba 101115 a43b4c 101042->101115 101044 a449c2 SystemParametersInfoW 101044->101045 101045->100956 101046->100930 101047->100934 101048->100941 101052->100957 101053->100960 101054->100966 101055->100968 101056->100972 101057->100973 101061 a68a1c 101058->101061 101060 a68a57 101060->100977 101064 a6a026 TlsSetValue 101060->101064 101061->101060 101063 a68a3a 101061->101063 101067 a75446 101061->101067 101063->101060 101063->101061 101075 a6a372 Sleep 101063->101075 101064->100980 101065->100984 101066->100981 101068 a75451 101067->101068 101072 a7546c 101067->101072 101069 a7545d 101068->101069 101068->101072 101076 a68d68 58 API calls __getptd_noexit 101069->101076 101070 a7547c RtlAllocateHeap 101070->101072 101073 a75462 101070->101073 101072->101070 101072->101073 101077 a635e1 DecodePointer 101072->101077 101073->101061 101075->101063 101076->101073 101077->101072 101078->100999 101079->101001 101080->100992 101081->101008 101082->101013 101083->101024 101085 a69011 101084->101085 101090 a68e99 101085->101090 101089 a6902c 101089->101027 101091 a68eb3 _memset ___raise_securityfailure 101090->101091 101092 a68ed3 IsDebuggerPresent 101091->101092 101098 a6a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 101092->101098 101094 a6c836 __crtLCMapStringA_stat 6 API calls 101095 a68fba 101094->101095 101097 a6a380 GetCurrentProcess TerminateProcess 101095->101097 101096 a68f97 ___raise_securityfailure 101096->101094 101097->101089 101098->101096 101100 a6a714 EncodePointer 101099->101100 101100->101100 101101 a6a72e 101100->101101 101101->101031 101103 a69e4b __lock 58 API calls 101102->101103 101104 a635b7 DecodePointer EncodePointer 101103->101104 101167 a69fb5 LeaveCriticalSection 101104->101167 101106 a449a7 101107 a63614 101106->101107 101108 a63638 101107->101108 101109 a6361e 101107->101109 101108->101040 101109->101108 101168 a68d68 58 API calls __getptd_noexit 101109->101168 101111 a63628 101169 a68ff6 9 API calls _fprintf 101111->101169 101113 a63633 101113->101040 101114->101042 101116 a43b59 __write_nolock 101115->101116 101117 a477c7 59 API calls 101116->101117 101118 a43b63 GetCurrentDirectoryW 101117->101118 101170 a43778 101118->101170 101120 a43b8c IsDebuggerPresent 101121 a7d4ad MessageBoxA 101120->101121 101122 a43b9a 101120->101122 101124 a7d4c7 101121->101124 101122->101124 101125 a43bb7 101122->101125 101154 a43c73 101122->101154 101123 a43c7a SetCurrentDirectoryW 101128 a43c87 Mailbox 101123->101128 101380 a47373 59 API calls Mailbox 101124->101380 101251 a473e5 101125->101251 101128->101044 101129 a7d4d7 101134 a7d4ed SetCurrentDirectoryW 101129->101134 101134->101128 101154->101123 101167->101106 101168->101111 101169->101113 101171 a477c7 59 API calls 101170->101171 101172 a4378e 101171->101172 101389 a43d43 101172->101389 101174 a437ac 101175 a44864 61 API calls 101174->101175 101176 a437c0 101175->101176 101177 a47f41 59 API calls 101176->101177 101178 a437cd 101177->101178 101179 a44f3d 136 API calls 101178->101179 101180 a437e6 101179->101180 101181 a7d3ae 101180->101181 101182 a437ee Mailbox 101180->101182 101435 aa97e5 101181->101435 101186 a481a7 59 API calls 101182->101186 101185 a7d3cd 101188 a62f95 _free 58 API calls 101185->101188 101189 a43801 101186->101189 101187 a44faa 84 API calls 101187->101185 101190 a7d3da 101188->101190 101403 a493ea 101189->101403 101192 a44faa 84 API calls 101190->101192 101194 a7d3e3 101192->101194 101198 a43ee2 59 API calls 101194->101198 101195 a47f41 59 API calls 101196 a4381a 101195->101196 101406 a48620 101196->101406 101200 a7d3fe 101198->101200 101199 a4382c Mailbox 101201 a47f41 59 API calls 101199->101201 101202 a43ee2 59 API calls 101200->101202 101203 a43852 101201->101203 101204 a7d41a 101202->101204 101205 a48620 69 API calls 101203->101205 101206 a44864 61 API calls 101204->101206 101207 a43861 Mailbox 101205->101207 101208 a7d43f 101206->101208 101211 a477c7 59 API calls 101207->101211 101209 a43ee2 59 API calls 101208->101209 101210 a7d44b 101209->101210 101212 a481a7 59 API calls 101210->101212 101213 a4387f 101211->101213 101214 a7d459 101212->101214 101410 a43ee2 101213->101410 101216 a43ee2 59 API calls 101214->101216 101218 a7d468 101216->101218 101224 a481a7 59 API calls 101218->101224 101220 a43899 101220->101194 101221 a438a3 101220->101221 101222 a6313d _W_store_winword 60 API calls 101221->101222 101223 a438ae 101222->101223 101223->101200 101225 a438b8 101223->101225 101226 a7d48a 101224->101226 101227 a6313d _W_store_winword 60 API calls 101225->101227 101228 a43ee2 59 API calls 101226->101228 101229 a438c3 101227->101229 101230 a7d497 101228->101230 101229->101204 101231 a438cd 101229->101231 101230->101230 101232 a6313d _W_store_winword 60 API calls 101231->101232 101233 a438d8 101232->101233 101233->101218 101234 a43919 101233->101234 101236 a43ee2 59 API calls 101233->101236 101234->101218 101235 a43926 101234->101235 101237 a4942e 59 API calls 101235->101237 101238 a438fc 101236->101238 101239 a43936 101237->101239 101240 a481a7 59 API calls 101238->101240 101241 a491b0 59 API calls 101239->101241 101242 a4390a 101240->101242 101243 a43944 101241->101243 101244 a43ee2 59 API calls 101242->101244 101426 a49040 101243->101426 101244->101234 101246 a493ea 59 API calls 101248 a43961 101246->101248 101247 a49040 60 API calls 101247->101248 101248->101246 101248->101247 101249 a43ee2 59 API calls 101248->101249 101250 a439a7 Mailbox 101248->101250 101249->101248 101250->101120 101252 a473f2 __write_nolock 101251->101252 101253 a7ee4b _memset 101252->101253 101254 a4740b 101252->101254 101256 a7ee67 GetOpenFileNameW 101253->101256 101482 a448ae 101254->101482 101258 a7eeb6 101256->101258 101260 a47d2c 59 API calls 101258->101260 101262 a7eecb 101260->101262 101262->101262 101380->101129 101390 a43d50 __write_nolock 101389->101390 101391 a47d2c 59 API calls 101390->101391 101396 a43eb6 Mailbox 101390->101396 101393 a43d82 101391->101393 101392 a47b52 59 API calls 101392->101393 101393->101392 101401 a43db8 Mailbox 101393->101401 101394 a47b52 59 API calls 101394->101401 101395 a43e89 101395->101396 101397 a47f41 59 API calls 101395->101397 101396->101174 101399 a43eaa 101397->101399 101398 a47f41 59 API calls 101398->101401 101400 a43f84 59 API calls 101399->101400 101400->101396 101401->101394 101401->101395 101401->101396 101401->101398 101470 a43f84 101401->101470 101404 a60ff6 Mailbox 59 API calls 101403->101404 101405 a4380d 101404->101405 101405->101195 101407 a4862b 101406->101407 101409 a48652 101407->101409 101476 a48b13 69 API calls Mailbox 101407->101476 101409->101199 101411 a43f05 101410->101411 101412 a43eec 101410->101412 101414 a47d2c 59 API calls 101411->101414 101413 a481a7 59 API calls 101412->101413 101415 a4388b 101413->101415 101414->101415 101416 a6313d 101415->101416 101417 a631be 101416->101417 101418 a63149 101416->101418 101479 a631d0 60 API calls 3 library calls 101417->101479 101425 a6316e 101418->101425 101477 a68d68 58 API calls __getptd_noexit 101418->101477 101421 a631cb 101421->101220 101422 a63155 101478 a68ff6 9 API calls _fprintf 101422->101478 101424 a63160 101424->101220 101425->101220 101427 a7f5a5 101426->101427 101429 a49057 101426->101429 101427->101429 101481 a48d3b 59 API calls Mailbox 101427->101481 101430 a491a0 101429->101430 101431 a49158 101429->101431 101434 a4915f 101429->101434 101480 a49e9c 60 API calls Mailbox 101430->101480 101433 a60ff6 Mailbox 59 API calls 101431->101433 101433->101434 101434->101248 101436 a45045 85 API calls 101435->101436 101437 aa9854 101436->101437 101438 aa99be 96 API calls 101437->101438 101439 aa9866 101438->101439 101440 a4506b 74 API calls 101439->101440 101441 a7d3c1 101439->101441 101442 aa9881 101440->101442 101441->101185 101441->101187 101443 a4506b 74 API calls 101442->101443 101444 aa9891 101443->101444 101445 a4506b 74 API calls 101444->101445 101446 aa98ac 101445->101446 101447 a4506b 74 API calls 101446->101447 101448 aa98c7 101447->101448 101449 a45045 85 API calls 101448->101449 101450 aa98de 101449->101450 101451 a6594c __crtLCMapStringA_stat 58 API calls 101450->101451 101452 aa98e5 101451->101452 101453 a6594c __crtLCMapStringA_stat 58 API calls 101452->101453 101454 aa98ef 101453->101454 101455 a4506b 74 API calls 101454->101455 101456 aa9903 101455->101456 101457 aa9393 GetSystemTimeAsFileTime 101456->101457 101458 aa9916 101457->101458 101459 aa992b 101458->101459 101460 aa9940 101458->101460 101461 a62f95 _free 58 API calls 101459->101461 101462 aa9946 101460->101462 101463 aa99a5 101460->101463 101465 aa9931 101461->101465 101466 aa8d90 116 API calls 101462->101466 101464 a62f95 _free 58 API calls 101463->101464 101464->101441 101467 a62f95 _free 58 API calls 101465->101467 101468 aa999d 101466->101468 101467->101441 101469 a62f95 _free 58 API calls 101468->101469 101469->101441 101471 a43f92 101470->101471 101475 a43fb4 _memmove 101470->101475 101474 a60ff6 Mailbox 59 API calls 101471->101474 101472 a60ff6 Mailbox 59 API calls 101473 a43fc8 101472->101473 101473->101401 101474->101475 101475->101472 101476->101409 101477->101422 101478->101424 101479->101421 101480->101434 101481->101429 101544 a71b90 101482->101544 101485 a448f7 101486 a448da 101545 a448bb GetFullPathNameW 101544->101545 101545->101485 101545->101486 101796 a43633 101797 a4366a 101796->101797 101798 a436e7 101797->101798 101799 a43688 101797->101799 101836 a436e5 101797->101836 101803 a436ed 101798->101803 101804 a7d31c 101798->101804 101800 a43695 101799->101800 101801 a4375d PostQuitMessage 101799->101801 101805 a436a0 101800->101805 101806 a7d38f 101800->101806 101837 a436d8 101801->101837 101802 a436ca DefWindowProcW 101802->101837 101808 a43715 SetTimer RegisterWindowMessageW 101803->101808 101809 a436f2 101803->101809 101846 a511d0 10 API calls Mailbox 101804->101846 101810 a43767 101805->101810 101811 a436a8 101805->101811 101850 aa2a16 71 API calls _memset 101806->101850 101812 a4373e CreatePopupMenu 101808->101812 101808->101837 101815 a7d2bf 101809->101815 101816 a436f9 KillTimer 101809->101816 101844 a44531 64 API calls _memset 101810->101844 101817 a7d374 101811->101817 101818 a436b3 101811->101818 101812->101837 101814 a7d343 101847 a511f3 331 API calls Mailbox 101814->101847 101822 a7d2c4 101815->101822 101823 a7d2f8 MoveWindow 101815->101823 101841 a444cb Shell_NotifyIconW _memset 101816->101841 101817->101802 101849 a9817e 59 API calls Mailbox 101817->101849 101826 a436be 101818->101826 101827 a4374b 101818->101827 101819 a7d3a1 101819->101802 101819->101837 101829 a7d2e7 SetFocus 101822->101829 101830 a7d2c8 101822->101830 101823->101837 101825 a4370c 101842 a43114 DeleteObject DestroyWindow Mailbox 101825->101842 101826->101802 101848 a444cb Shell_NotifyIconW _memset 101826->101848 101843 a445df 81 API calls _memset 101827->101843 101828 a4375b 101828->101837 101829->101837 101830->101826 101834 a7d2d1 101830->101834 101845 a511d0 10 API calls Mailbox 101834->101845 101836->101802 101839 a7d368 101840 a443db 68 API calls 101839->101840 101840->101836 101841->101825 101842->101837 101843->101828 101844->101828 101845->101837 101846->101814 101847->101826 101848->101839 101849->101836 101850->101819 101851 a4107d 101856 a471eb 101851->101856 101853 a4108c 101854 a62f80 __cinit 67 API calls 101853->101854 101855 a41096 101854->101855 101857 a471fb __write_nolock 101856->101857 101858 a477c7 59 API calls 101857->101858 101859 a472b1 101858->101859 101860 a44864 61 API calls 101859->101860 101861 a472ba 101860->101861 101887 a6074f 101861->101887 101864 a47e0b 59 API calls 101865 a472d3 101864->101865 101866 a43f84 59 API calls 101865->101866 101867 a472e2 101866->101867 101868 a477c7 59 API calls 101867->101868 101869 a472eb 101868->101869 101870 a47eec 59 API calls 101869->101870 101871 a472f4 RegOpenKeyExW 101870->101871 101872 a7ecda RegQueryValueExW 101871->101872 101875 a47316 Mailbox 101871->101875 101873 a7ecf7 101872->101873 101874 a7ed6c RegCloseKey 101872->101874 101876 a60ff6 Mailbox 59 API calls 101873->101876 101874->101875 101886 a7ed7e _wcscat Mailbox __NMSG_WRITE 101874->101886 101875->101853 101877 a7ed10 101876->101877 101878 a4538e 59 API calls 101877->101878 101879 a7ed1b RegQueryValueExW 101878->101879 101880 a7ed38 101879->101880 101883 a7ed52 101879->101883 101881 a47d2c 59 API calls 101880->101881 101881->101883 101882 a47b52 59 API calls 101882->101886 101883->101874 101884 a47f41 59 API calls 101884->101886 101885 a43f84 59 API calls 101885->101886 101886->101875 101886->101882 101886->101884 101886->101885 101888 a71b90 __write_nolock 101887->101888 101889 a6075c GetFullPathNameW 101888->101889 101890 a6077e 101889->101890 101891 a47d2c 59 API calls 101890->101891 101892 a472c5 101891->101892 101892->101864 101893 a4b56e 101900 a5fb84 101893->101900 101895 a4b584 101896 a4c707 69 API calls 101895->101896 101897 a4b5ac 101896->101897 101898 a4a4e8 101897->101898 101909 aaa0b5 89 API calls 4 library calls 101897->101909 101901 a5fb90 101900->101901 101902 a5fba2 101900->101902 101910 a49e9c 60 API calls Mailbox 101901->101910 101904 a5fbd1 101902->101904 101905 a5fba8 101902->101905 101911 a49e9c 60 API calls Mailbox 101904->101911 101906 a60ff6 Mailbox 59 API calls 101905->101906 101908 a5fb9a 101906->101908 101908->101895 101909->101898 101910->101908 101911->101908 101912 a4568a 101913 a45c18 59 API calls 101912->101913 101914 a4569c 101913->101914 101915 a45632 61 API calls 101914->101915 101916 a456aa 101915->101916 101918 a456ba Mailbox 101916->101918 101919 a481c1 61 API calls Mailbox 101916->101919 101919->101918 101920 a80226 101926 a4ade2 Mailbox 101920->101926 101922 a80c86 101923 a966f4 Mailbox 59 API calls 101922->101923 101924 a80c8f 101923->101924 101926->101922 101926->101924 101927 a800e0 VariantClear 101926->101927 101928 a4b6c1 101926->101928 101930 abe24b 130 API calls 101926->101930 101931 ac23c9 87 API calls 101926->101931 101932 ab474d 331 API calls 101926->101932 101933 a52123 95 API calls 101926->101933 101934 aad2e6 101 API calls 101926->101934 101935 abe237 130 API calls 101926->101935 101936 a49df0 59 API calls Mailbox 101926->101936 101937 a97405 59 API calls 101926->101937 101927->101926 101938 aaa0b5 89 API calls 4 library calls 101928->101938 101930->101926 101931->101926 101932->101926 101933->101926 101934->101926 101935->101926 101936->101926 101937->101926 101938->101922 101939 14e2410 101953 14e0000 101939->101953 101941 14e24c0 101956 14e2300 101941->101956 101959 14e34f0 GetPEB 101953->101959 101955 14e068b 101955->101941 101957 14e2309 Sleep 101956->101957 101958 14e2317 101957->101958 101960 14e351a 101959->101960 101960->101955 101961 a4e70b 101964 a4d260 101961->101964 101963 a4e719 101965 a4d27d 101964->101965 101993 a4d4dd 101964->101993 101966 a82b0a 101965->101966 101967 a82abb 101965->101967 101997 a4d2a4 101965->101997 102008 aba6fb 331 API calls __cinit 101966->102008 101968 a82abe 101967->101968 101977 a82ad9 101967->101977 101971 a82aca 101968->101971 101968->101997 102006 abad0f 331 API calls 101971->102006 101974 a62f80 __cinit 67 API calls 101974->101997 101975 a82cdf 101975->101975 101976 a4d6ab 101976->101963 101977->101993 102007 abb1b7 331 API calls 3 library calls 101977->102007 101978 a4d594 102000 a48bb2 68 API calls 101978->102000 101982 a4d5a3 101982->101963 101983 a82c26 102012 abaa66 89 API calls 101983->102012 101987 a48620 69 API calls 101987->101997 101993->101976 102013 aaa0b5 89 API calls 4 library calls 101993->102013 101994 a4a000 331 API calls 101994->101997 101995 a481a7 59 API calls 101995->101997 101997->101974 101997->101976 101997->101978 101997->101983 101997->101987 101997->101993 101997->101994 101997->101995 101998 a488a0 68 API calls __cinit 101997->101998 101999 a486a2 68 API calls 101997->101999 102001 a4859a 68 API calls 101997->102001 102002 a4d0dc 331 API calls 101997->102002 102003 a49f3a 59 API calls Mailbox 101997->102003 102004 a4d060 89 API calls 101997->102004 102005 a4cedd 331 API calls 101997->102005 102009 a48bb2 68 API calls 101997->102009 102010 a49e9c 60 API calls Mailbox 101997->102010 102011 a96d03 60 API calls 101997->102011 101998->101997 101999->101997 102000->101982 102001->101997 102002->101997 102003->101997 102004->101997 102005->101997 102006->101976 102007->101993 102008->101997 102009->101997 102010->101997 102011->101997 102012->101993 102013->101975

                        Control-flow Graph

                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A43B7A
                        • IsDebuggerPresent.KERNEL32 ref: 00A43B8C
                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,00B062F8,00B062E0,?,?), ref: 00A43BFD
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                          • Part of subcall function 00A50A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00A43C26,00B062F8,?,?,?), ref: 00A50ACE
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A43C81
                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00AF93F0,00000010), ref: 00A7D4BC
                        • SetCurrentDirectoryW.KERNEL32(?,00B062F8,?,?,?), ref: 00A7D4F4
                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00AF5D40,00B062F8,?,?,?), ref: 00A7D57A
                        • ShellExecuteW.SHELL32(00000000,?,?), ref: 00A7D581
                          • Part of subcall function 00A43A58: GetSysColorBrush.USER32(0000000F), ref: 00A43A62
                          • Part of subcall function 00A43A58: LoadCursorW.USER32(00000000,00007F00), ref: 00A43A71
                          • Part of subcall function 00A43A58: LoadIconW.USER32(00000063), ref: 00A43A88
                          • Part of subcall function 00A43A58: LoadIconW.USER32(000000A4), ref: 00A43A9A
                          • Part of subcall function 00A43A58: LoadIconW.USER32(000000A2), ref: 00A43AAC
                          • Part of subcall function 00A43A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A43AD2
                          • Part of subcall function 00A43A58: RegisterClassExW.USER32(?), ref: 00A43B28
                          • Part of subcall function 00A439E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A43A15
                          • Part of subcall function 00A439E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A43A36
                          • Part of subcall function 00A439E7: ShowWindow.USER32(00000000,?,?), ref: 00A43A4A
                          • Part of subcall function 00A439E7: ShowWindow.USER32(00000000,?,?), ref: 00A43A53
                          • Part of subcall function 00A443DB: _memset.LIBCMT ref: 00A44401
                          • Part of subcall function 00A443DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A444A6
                        Strings
                        • runas, xrefs: 00A7D575
                        • This is a third-party compiled AutoIt script., xrefs: 00A7D4B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                        • String ID: This is a third-party compiled AutoIt script.$runas
                        • API String ID: 529118366-3287110873
                        • Opcode ID: 7bf90a9ceed066c513dd2e1416ee6d716a42bd204a71fce27752f5ca8e565f08
                        • Instruction ID: eac2f59377b36c893ce3d978b6d121cfc5ffa0a7ca4d3739ae54990a90079ca0
                        • Opcode Fuzzy Hash: 7bf90a9ceed066c513dd2e1416ee6d716a42bd204a71fce27752f5ca8e565f08
                        • Instruction Fuzzy Hash: DC51F439D04289AECF11EBB4DD45EFE7BB5AF94300B0081B5F455671A1DF705A1ACB21
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 996 a44afe-a44b5e call a477c7 GetVersionExW call a47d2c 1001 a44b64 996->1001 1002 a44c69-a44c6b 996->1002 1003 a44b67-a44b6c 1001->1003 1004 a7db90-a7db9c 1002->1004 1006 a44c70-a44c71 1003->1006 1007 a44b72 1003->1007 1005 a7db9d-a7dba1 1004->1005 1008 a7dba4-a7dbb0 1005->1008 1009 a7dba3 1005->1009 1010 a44b73-a44baa call a47e8c call a47886 1006->1010 1007->1010 1008->1005 1011 a7dbb2-a7dbb7 1008->1011 1009->1008 1019 a44bb0-a44bb1 1010->1019 1020 a7dc8d-a7dc90 1010->1020 1011->1003 1013 a7dbbd-a7dbc4 1011->1013 1013->1004 1015 a7dbc6 1013->1015 1018 a7dbcb-a7dbce 1015->1018 1021 a7dbd4-a7dbf2 1018->1021 1022 a44bf1-a44c08 GetCurrentProcess IsWow64Process 1018->1022 1019->1018 1023 a44bb7-a44bc2 1019->1023 1024 a7dc92 1020->1024 1025 a7dca9-a7dcad 1020->1025 1021->1022 1028 a7dbf8-a7dbfe 1021->1028 1026 a44c0d-a44c1e 1022->1026 1027 a44c0a 1022->1027 1029 a7dc13-a7dc19 1023->1029 1030 a44bc8-a44bca 1023->1030 1031 a7dc95 1024->1031 1032 a7dcaf-a7dcb8 1025->1032 1033 a7dc98-a7dca1 1025->1033 1035 a44c20-a44c30 call a44c95 1026->1035 1036 a44c89-a44c93 GetSystemInfo 1026->1036 1027->1026 1037 a7dc00-a7dc03 1028->1037 1038 a7dc08-a7dc0e 1028->1038 1041 a7dc23-a7dc29 1029->1041 1042 a7dc1b-a7dc1e 1029->1042 1039 a44bd0-a44bd3 1030->1039 1040 a7dc2e-a7dc3a 1030->1040 1031->1033 1032->1031 1034 a7dcba-a7dcbd 1032->1034 1033->1025 1034->1033 1053 a44c32-a44c3f call a44c95 1035->1053 1054 a44c7d-a44c87 GetSystemInfo 1035->1054 1043 a44c56-a44c66 1036->1043 1037->1022 1038->1022 1047 a7dc5a-a7dc5d 1039->1047 1048 a44bd9-a44be8 1039->1048 1044 a7dc44-a7dc4a 1040->1044 1045 a7dc3c-a7dc3f 1040->1045 1041->1022 1042->1022 1044->1022 1045->1022 1047->1022 1050 a7dc63-a7dc78 1047->1050 1051 a7dc4f-a7dc55 1048->1051 1052 a44bee 1048->1052 1055 a7dc82-a7dc88 1050->1055 1056 a7dc7a-a7dc7d 1050->1056 1051->1022 1052->1022 1061 a44c76-a44c7b 1053->1061 1062 a44c41-a44c45 GetNativeSystemInfo 1053->1062 1057 a44c47-a44c4b 1054->1057 1055->1022 1056->1022 1057->1043 1060 a44c4d-a44c50 FreeLibrary 1057->1060 1060->1043 1061->1062 1062->1057
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00A44B2B
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                        • GetCurrentProcess.KERNEL32(?,00ACFAEC,00000000,00000000,?), ref: 00A44BF8
                        • IsWow64Process.KERNEL32(00000000), ref: 00A44BFF
                        • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00A44C45
                        • FreeLibrary.KERNEL32(00000000), ref: 00A44C50
                        • GetSystemInfo.KERNEL32(00000000), ref: 00A44C81
                        • GetSystemInfo.KERNEL32(00000000), ref: 00A44C8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                        • String ID:
                        • API String ID: 1986165174-0
                        • Opcode ID: 7662832f712736244ea9dcffac15b324f5baa349b36dd12e3cb716843863420b
                        • Instruction ID: d5e7a6968c1ba9425907683a4ae29453df805f4226d504bd0cb6e3a1cf324925
                        • Opcode Fuzzy Hash: 7662832f712736244ea9dcffac15b324f5baa349b36dd12e3cb716843863420b
                        • Instruction Fuzzy Hash: EF91C53554A7C0DEC731DB7889916AAFFF5AF69301B488E9DD0CB93B01D220E948C719
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1063 a44fe9-a45001 CreateStreamOnHGlobal 1064 a45021-a45026 1063->1064 1065 a45003-a4501a FindResourceExW 1063->1065 1066 a45020 1065->1066 1067 a7dd5c-a7dd6b LoadResource 1065->1067 1066->1064 1067->1066 1068 a7dd71-a7dd7f SizeofResource 1067->1068 1068->1066 1069 a7dd85-a7dd90 LockResource 1068->1069 1069->1066 1070 a7dd96-a7ddb4 1069->1070 1070->1066
                        APIs
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00A44EEE,?,?,00000000,00000000), ref: 00A44FF9
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00A44EEE,?,?,00000000,00000000), ref: 00A45010
                        • LoadResource.KERNEL32(?,00000000,?,?,00A44EEE,?,?,00000000,00000000,?,?,?,?,?,?,00A44F8F), ref: 00A7DD60
                        • SizeofResource.KERNEL32(?,00000000,?,?,00A44EEE,?,?,00000000,00000000,?,?,?,?,?,?,00A44F8F), ref: 00A7DD75
                        • LockResource.KERNEL32(00A44EEE,?,?,00A44EEE,?,?,00000000,00000000,?,?,?,?,?,?,00A44F8F,00000000), ref: 00A7DD88
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT
                        • API String ID: 3051347437-3967369404
                        • Opcode ID: bd5fbf5762099100db721c9f74983e9487bef3ae2d9808367afacc39908fc23e
                        • Instruction ID: f678f864ea9ebf35daafa01e37b4af43740768fcc342f941ecd212290b2936c9
                        • Opcode Fuzzy Hash: bd5fbf5762099100db721c9f74983e9487bef3ae2d9808367afacc39908fc23e
                        • Instruction Fuzzy Hash: 2E117C79640700BFE7218BA9DC58F677BBEEBC9B51F21856CF406C6260DB71EC018660
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetFileAttributesW.KERNELBASE(?,00A7E7C1), ref: 00AA46A6
                        • FindFirstFileW.KERNELBASE(?,?), ref: 00AA46B7
                        • FindClose.KERNEL32(00000000), ref: 00AA46C7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirst
                        • String ID:
                        • API String ID: 48322524-0
                        • Opcode ID: 749517414b65507b883173a15d6fa1f245e67197464a26bdd38f20888404fdd7
                        • Instruction ID: 76ee07a876b5590298551cb40e549c0c6782f249f7a6aac4b91a97e269ab47e7
                        • Opcode Fuzzy Hash: 749517414b65507b883173a15d6fa1f245e67197464a26bdd38f20888404fdd7
                        • Instruction Fuzzy Hash: 01E0DF328148006F8210A778EC4D8EA779D9E8B335F100726F835C21E0EBF09960869A
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        • Variable must be of type 'Object'., xrefs: 00A8428C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable must be of type 'Object'.
                        • API String ID: 0-109567571
                        • Opcode ID: 9fe3be0ecd59829975f224fb83e0afe7acdc94514b02305c4a1a1b0be1f39fe3
                        • Instruction ID: 21dbb3265eb93c496ab9515ef24506922bf830aef1612741d17c491bef3e60b0
                        • Opcode Fuzzy Hash: 9fe3be0ecd59829975f224fb83e0afe7acdc94514b02305c4a1a1b0be1f39fe3
                        • Instruction Fuzzy Hash: 7CA29C79E04206CFCB24DF98C580AAEB7B1FF99300F248169E916AB351D775ED42CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A50BBB
                        • timeGetTime.WINMM ref: 00A50E76
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A50FB3
                        • TranslateMessage.USER32(?), ref: 00A50FC7
                        • DispatchMessageW.USER32(?), ref: 00A50FD5
                        • Sleep.KERNEL32(0000000A), ref: 00A50FDF
                        • LockWindowUpdate.USER32(00000000,?,?), ref: 00A5105A
                        • DestroyWindow.USER32 ref: 00A51066
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A51080
                        • Sleep.KERNEL32(0000000A,?,?), ref: 00A852AD
                        • TranslateMessage.USER32(?), ref: 00A8608A
                        • DispatchMessageW.USER32(?), ref: 00A86098
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A860AC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                        • API String ID: 4003667617-3242690629
                        • Opcode ID: 6820f4e3e1fdcdbd4d99d20897bed240d8dcd05b73f101852f47b6ede14fd840
                        • Instruction ID: bfdfa6bc5ace93ccbddc29c4efb87a529bc6ec2fd8f81002110068c91a1099db
                        • Opcode Fuzzy Hash: 6820f4e3e1fdcdbd4d99d20897bed240d8dcd05b73f101852f47b6ede14fd840
                        • Instruction Fuzzy Hash: DFB2B370A08741DFDB24EF24C985FAEB7E5BF84304F18491DE89987291DB71E849CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00AA91E9: __time64.LIBCMT ref: 00AA91F3
                          • Part of subcall function 00A45045: _fseek.LIBCMT ref: 00A4505D
                        • __wsplitpath.LIBCMT ref: 00AA94BE
                          • Part of subcall function 00A6432E: __wsplitpath_helper.LIBCMT ref: 00A6436E
                        • _wcscpy.LIBCMT ref: 00AA94D1
                        • _wcscat.LIBCMT ref: 00AA94E4
                        • __wsplitpath.LIBCMT ref: 00AA9509
                        • _wcscat.LIBCMT ref: 00AA951F
                        • _wcscat.LIBCMT ref: 00AA9532
                          • Part of subcall function 00AA922F: _memmove.LIBCMT ref: 00AA9268
                          • Part of subcall function 00AA922F: _memmove.LIBCMT ref: 00AA9277
                        • _wcscmp.LIBCMT ref: 00AA9479
                          • Part of subcall function 00AA99BE: _wcscmp.LIBCMT ref: 00AA9AAE
                          • Part of subcall function 00AA99BE: _wcscmp.LIBCMT ref: 00AA9AC1
                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00AA96DC
                        • _wcsncpy.LIBCMT ref: 00AA974F
                        • DeleteFileW.KERNEL32(?,?), ref: 00AA9785
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00AA979B
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AA97AC
                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AA97BE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                        • String ID:
                        • API String ID: 1500180987-0
                        • Opcode ID: eb97bf75d05bf99d15b7bd4ec2169a93d7cd275fa684ac960ac1f3160d2e1a6c
                        • Instruction ID: a3193a6263cde7d07173f6833d8d0fc20566b7b929ecfa1fa529ec6cd5f8d305
                        • Opcode Fuzzy Hash: eb97bf75d05bf99d15b7bd4ec2169a93d7cd275fa684ac960ac1f3160d2e1a6c
                        • Instruction Fuzzy Hash: 2EC11AB5D00229AEDF21DFA4CD85ADFB7BDAF85300F0040AAF609E7191DB709A448F65
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00A43074
                        • RegisterClassExW.USER32(00000030), ref: 00A4309E
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A430AF
                        • InitCommonControlsEx.COMCTL32(?), ref: 00A430CC
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A430DC
                        • LoadIconW.USER32(000000A9), ref: 00A430F2
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A43101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: 301cdbdd9520d4ab9e037b4b39ebbd89157f6ce9c1bd66f29c5393441c09c861
                        • Instruction ID: 9bf767b31fe9a7151f89698dde300f88b75d6a8bc4d2962a7de0f0cd8989ef5c
                        • Opcode Fuzzy Hash: 301cdbdd9520d4ab9e037b4b39ebbd89157f6ce9c1bd66f29c5393441c09c861
                        • Instruction Fuzzy Hash: BA3147B1941309EFDB50DFE4E889AC9BBF1FB19310F10852EE590E62A0E7B54596CF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00A43074
                        • RegisterClassExW.USER32(00000030), ref: 00A4309E
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A430AF
                        • InitCommonControlsEx.COMCTL32(?), ref: 00A430CC
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A430DC
                        • LoadIconW.USER32(000000A9), ref: 00A430F2
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A43101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: 2c8d5bef2f93c6f4e778d86df8f2b1e9dad58eb154459a41e51ec7afd813f1b9
                        • Instruction ID: d996265689624c23ad84a1984979acf97e7f58267265c9762e930ab72bb2b78a
                        • Opcode Fuzzy Hash: 2c8d5bef2f93c6f4e778d86df8f2b1e9dad58eb154459a41e51ec7afd813f1b9
                        • Instruction Fuzzy Hash: E421C3B1D00318AFDB00DFE4E889B9DBBF5FB18700F01812AFA11A72A0EBB145558F95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00A44864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B062F8,?,00A437C0,?), ref: 00A44882
                          • Part of subcall function 00A6074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00A472C5), ref: 00A60771
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00A47308
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A7ECF1
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A7ED32
                        • RegCloseKey.ADVAPI32(?), ref: 00A7ED70
                        • _wcscat.LIBCMT ref: 00A7EDC9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 2673923337-2727554177
                        • Opcode ID: ae7976bdc2c0305efd69969694b4eccfce793fd35f4bd8ae73c6dc52c0f7bd33
                        • Instruction ID: e3bafb35f38d31ebfac4669992971a09a18ec3ce8d2a8076c1653347fda3783b
                        • Opcode Fuzzy Hash: ae7976bdc2c0305efd69969694b4eccfce793fd35f4bd8ae73c6dc52c0f7bd33
                        • Instruction Fuzzy Hash: B4717B71848341AEC714EF25DD8599BBBF8FFA9340B44492EF445871A1EF30A948CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00A43A62
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00A43A71
                        • LoadIconW.USER32(00000063), ref: 00A43A88
                        • LoadIconW.USER32(000000A4), ref: 00A43A9A
                        • LoadIconW.USER32(000000A2), ref: 00A43AAC
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A43AD2
                        • RegisterClassExW.USER32(?), ref: 00A43B28
                          • Part of subcall function 00A43041: GetSysColorBrush.USER32(0000000F), ref: 00A43074
                          • Part of subcall function 00A43041: RegisterClassExW.USER32(00000030), ref: 00A4309E
                          • Part of subcall function 00A43041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A430AF
                          • Part of subcall function 00A43041: InitCommonControlsEx.COMCTL32(?), ref: 00A430CC
                          • Part of subcall function 00A43041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A430DC
                          • Part of subcall function 00A43041: LoadIconW.USER32(000000A9), ref: 00A430F2
                          • Part of subcall function 00A43041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A43101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: e867668b85c71c40576f9af6b33ea970f5fe38d5b37f622f0bb81da81a185d8c
                        • Instruction ID: 2606ebc1fc849ad889e80428ebe6e67d42bc0b42c988b2c32d5771c7ef125b1e
                        • Opcode Fuzzy Hash: e867668b85c71c40576f9af6b33ea970f5fe38d5b37f622f0bb81da81a185d8c
                        • Instruction Fuzzy Hash: BA214671E00308EFEB10DFA4EC09F9D7BB5FB18721F00812AE504A72A0DBB656648F84
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 767 a43633-a43681 769 a436e1-a436e3 767->769 770 a43683-a43686 767->770 769->770 773 a436e5 769->773 771 a436e7 770->771 772 a43688-a4368f 770->772 777 a436ed-a436f0 771->777 778 a7d31c-a7d34a call a511d0 call a511f3 771->778 774 a43695-a4369a 772->774 775 a4375d-a43765 PostQuitMessage 772->775 776 a436ca-a436d2 DefWindowProcW 773->776 779 a436a0-a436a2 774->779 780 a7d38f-a7d3a3 call aa2a16 774->780 783 a43711-a43713 775->783 782 a436d8-a436de 776->782 784 a43715-a4373c SetTimer RegisterWindowMessageW 777->784 785 a436f2-a436f3 777->785 813 a7d34f-a7d356 778->813 786 a43767-a43776 call a44531 779->786 787 a436a8-a436ad 779->787 780->783 805 a7d3a9 780->805 783->782 784->783 788 a4373e-a43749 CreatePopupMenu 784->788 791 a7d2bf-a7d2c2 785->791 792 a436f9-a4370c KillTimer call a444cb call a43114 785->792 786->783 793 a7d374-a7d37b 787->793 794 a436b3-a436b8 787->794 788->783 798 a7d2c4-a7d2c6 791->798 799 a7d2f8-a7d317 MoveWindow 791->799 792->783 793->776 802 a7d381-a7d38a call a9817e 793->802 803 a436be-a436c4 794->803 804 a4374b-a4375b call a445df 794->804 808 a7d2e7-a7d2f3 SetFocus 798->808 809 a7d2c8-a7d2cb 798->809 799->783 802->776 803->776 803->813 804->783 805->776 808->783 809->803 814 a7d2d1-a7d2e2 call a511d0 809->814 813->776 818 a7d35c-a7d36f call a444cb call a443db 813->818 814->783 818->776
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?), ref: 00A436D2
                        • KillTimer.USER32(?,00000001), ref: 00A436FC
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A4371F
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A4372A
                        • CreatePopupMenu.USER32 ref: 00A4373E
                        • PostQuitMessage.USER32(00000000), ref: 00A4375F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated
                        • API String ID: 129472671-2362178303
                        • Opcode ID: f029fa86f31687fda7202d3f49412db3c36add958b8e4fb34f276a31fa01dddc
                        • Instruction ID: 2a0a318d83415b03c0ed9c663671410a5e1133c51aeeef28ee68b231f624d505
                        • Opcode Fuzzy Hash: f029fa86f31687fda7202d3f49412db3c36add958b8e4fb34f276a31fa01dddc
                        • Instruction Fuzzy Hash: A6415ABB200106BFDF149F68DD09B7A37A5EB94300F154129FA02872E2DF609E219771
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                        • API String ID: 1825951767-3513169116
                        • Opcode ID: e3b569df7667a4bd80afd19fae864c7563baf6ced96e20b6a63d4d9e421e39c6
                        • Instruction ID: b7ba4ce673eaab81ca7b6b6ea84c7252da39c40227aa85240d0f8026efc13fc4
                        • Opcode Fuzzy Hash: e3b569df7667a4bd80afd19fae864c7563baf6ced96e20b6a63d4d9e421e39c6
                        • Instruction Fuzzy Hash: 40A1527AD102299ADF04EFA4CD96EEEB7B8BF94300F104529F416B7192DF745A09CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 942 14e2640-14e26ee call 14e0000 945 14e26f5-14e271b call 14e3550 CreateFileW 942->945 948 14e271d 945->948 949 14e2722-14e2732 945->949 950 14e286d-14e2871 948->950 957 14e2739-14e2753 VirtualAlloc 949->957 958 14e2734 949->958 951 14e28b3-14e28b6 950->951 952 14e2873-14e2877 950->952 954 14e28b9-14e28c0 951->954 955 14e2879-14e287c 952->955 956 14e2883-14e2887 952->956 959 14e2915-14e292a 954->959 960 14e28c2-14e28cd 954->960 955->956 961 14e2889-14e2893 956->961 962 14e2897-14e289b 956->962 963 14e275a-14e2771 ReadFile 957->963 964 14e2755 957->964 958->950 969 14e292c-14e2937 VirtualFree 959->969 970 14e293a-14e2942 959->970 967 14e28cf 960->967 968 14e28d1-14e28dd 960->968 961->962 971 14e289d-14e28a7 962->971 972 14e28ab 962->972 965 14e2778-14e27b8 VirtualAlloc 963->965 966 14e2773 963->966 964->950 973 14e27bf-14e27da call 14e37a0 965->973 974 14e27ba 965->974 966->950 967->959 975 14e28df-14e28ef 968->975 976 14e28f1-14e28fd 968->976 969->970 971->972 972->951 982 14e27e5-14e27ef 973->982 974->950 978 14e2913 975->978 979 14e28ff-14e2908 976->979 980 14e290a-14e2910 976->980 978->954 979->978 980->978 983 14e2822-14e2836 call 14e35b0 982->983 984 14e27f1-14e2820 call 14e37a0 982->984 990 14e283a-14e283e 983->990 991 14e2838 983->991 984->982 992 14e284a-14e284e 990->992 993 14e2840-14e2844 FindCloseChangeNotification 990->993 991->950 994 14e285e-14e2867 992->994 995 14e2850-14e285b VirtualFree 992->995 993->992 994->945 994->950 995->994
                        APIs
                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 014E2711
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 014E2937
                        Memory Dump Source
                        • Source File: 00000000.00000002.1285630358.00000000014E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_14e0000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateFileFreeVirtual
                        • String ID:
                        • API String ID: 204039940-0
                        • Opcode ID: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                        • Instruction ID: 2b91a0d5ec7150b0259de209d57e48cf31a52f6b1d46da4c739bb2fdbf1709a0
                        • Opcode Fuzzy Hash: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                        • Instruction Fuzzy Hash: C7A10A74E00209EBDB14CFA4C898FEEBBB9BF48305F10865AE505BB291D7B59A41CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1073 a439e7-a43a57 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A43A15
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A43A36
                        • ShowWindow.USER32(00000000,?,?), ref: 00A43A4A
                        • ShowWindow.USER32(00000000,?,?), ref: 00A43A53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: 33ef17968b2de66dc6aea1874d50d403de40a0de86913c483e5bb299f7a85c28
                        • Instruction ID: 28342b3e00fae668e7db0473b89d0c7b07e510d5733b2aedf96865e946e05dd3
                        • Opcode Fuzzy Hash: 33ef17968b2de66dc6aea1874d50d403de40a0de86913c483e5bb299f7a85c28
                        • Instruction Fuzzy Hash: 8EF01270600290BEEA205B23AC0CE272F7EE7D6F50B01406EB904E31A0CAA60821CAB0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1074 14e2410-14e2536 call 14e0000 call 14e2300 CreateFileW 1081 14e253d-14e254d 1074->1081 1082 14e2538 1074->1082 1085 14e254f 1081->1085 1086 14e2554-14e256e VirtualAlloc 1081->1086 1083 14e25ed-14e25f2 1082->1083 1085->1083 1087 14e2572-14e2589 ReadFile 1086->1087 1088 14e2570 1086->1088 1089 14e258d-14e25c7 call 14e2340 call 14e1300 1087->1089 1090 14e258b 1087->1090 1088->1083 1095 14e25c9-14e25de call 14e2390 1089->1095 1096 14e25e3-14e25eb ExitProcess 1089->1096 1090->1083 1095->1096 1096->1083
                        APIs
                          • Part of subcall function 014E2300: Sleep.KERNELBASE(000001F4), ref: 014E2311
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 014E252C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1285630358.00000000014E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_14e0000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateFileSleep
                        • String ID: Y276H3QPBZXYPUAK1SHEB7SSFA
                        • API String ID: 2694422964-3885471768
                        • Opcode ID: 4337a50bac1333f0d85bbb39516958c00a8755fb6602be3dd96ba00e7acb4a11
                        • Instruction ID: 59c73a6598b97880233b7d7f55ae99a495dd0d3d025950ca87a09f93613f5a03
                        • Opcode Fuzzy Hash: 4337a50bac1333f0d85bbb39516958c00a8755fb6602be3dd96ba00e7acb4a11
                        • Instruction Fuzzy Hash: 79519470D04289DAEF11D7B8CD18BEFBBB89F15305F044199E6497B2C1C6B90B49CB65
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1098 a4410d-a44123 1099 a44200-a44204 1098->1099 1100 a44129-a4413e call a47b76 1098->1100 1103 a44144-a44164 call a47d2c 1100->1103 1104 a7d5dd-a7d5ec LoadStringW 1100->1104 1106 a7d5f7-a7d60f call a47c8e call a47143 1103->1106 1108 a4416a-a4416e 1103->1108 1104->1106 1116 a4417e-a441fb call a63020 call a4463e call a62ffc Shell_NotifyIconW call a45a64 1106->1116 1120 a7d615-a7d633 call a47e0b call a47143 call a47e0b 1106->1120 1110 a44174-a44179 call a47c8e 1108->1110 1111 a44205-a4420e call a481a7 1108->1111 1110->1116 1111->1116 1116->1099 1120->1116
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A7D5EC
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                        • _memset.LIBCMT ref: 00A4418D
                        • _wcscpy.LIBCMT ref: 00A441E1
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A441F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                        • String ID: Line:
                        • API String ID: 3942752672-1585850449
                        • Opcode ID: f0a0b8d8f5a343be32f962b9b653299858fb1005898c6aa894ff7d62d3f8d809
                        • Instruction ID: c5dba4ab49deb7586e1c1c867eb5ca19e0a77293189fc2fd27ed94317b659a7e
                        • Opcode Fuzzy Hash: f0a0b8d8f5a343be32f962b9b653299858fb1005898c6aa894ff7d62d3f8d809
                        • Instruction Fuzzy Hash: CE31E275408354AFE721EB64DD86FDF77E8AF94300F10461AF185930A1EF70AA58C792
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1133 a6564d-a65666 1134 a65683 1133->1134 1135 a65668-a6566d 1133->1135 1136 a65685-a6568b 1134->1136 1135->1134 1137 a6566f-a65671 1135->1137 1138 a65673-a65678 call a68d68 1137->1138 1139 a6568c-a65691 1137->1139 1149 a6567e call a68ff6 1138->1149 1141 a65693-a6569d 1139->1141 1142 a6569f-a656a3 1139->1142 1141->1142 1144 a656c3-a656d2 1141->1144 1145 a656a5-a656b0 call a63020 1142->1145 1146 a656b3-a656b5 1142->1146 1147 a656d4-a656d7 1144->1147 1148 a656d9 1144->1148 1145->1146 1146->1138 1151 a656b7-a656c1 1146->1151 1152 a656de-a656e3 1147->1152 1148->1152 1149->1134 1151->1138 1151->1144 1155 a657cc-a657cf 1152->1155 1156 a656e9-a656f0 1152->1156 1155->1136 1157 a656f2-a656fa 1156->1157 1158 a65731-a65733 1156->1158 1157->1158 1159 a656fc 1157->1159 1160 a65735-a65737 1158->1160 1161 a6579d-a6579e call a70df7 1158->1161 1162 a65702-a65704 1159->1162 1163 a657fa 1159->1163 1164 a6575b-a65766 1160->1164 1165 a65739-a65741 1160->1165 1174 a657a3-a657a7 1161->1174 1169 a65706-a65708 1162->1169 1170 a6570b-a65710 1162->1170 1171 a657fe-a65807 1163->1171 1167 a6576a-a6576d 1164->1167 1168 a65768 1164->1168 1172 a65743-a6574f 1165->1172 1173 a65751-a65755 1165->1173 1177 a657d4-a657d8 1167->1177 1178 a6576f-a6577b call a64916 call a710ab 1167->1178 1168->1167 1169->1170 1170->1177 1179 a65716-a6572f call a70f18 1170->1179 1171->1136 1175 a65757-a65759 1172->1175 1173->1175 1174->1171 1176 a657a9-a657ae 1174->1176 1175->1167 1176->1177 1180 a657b0-a657c1 1176->1180 1181 a657ea-a657f5 call a68d68 1177->1181 1182 a657da-a657e7 call a63020 1177->1182 1194 a65780-a65785 1178->1194 1193 a65792-a6579b 1179->1193 1185 a657c4-a657c6 1180->1185 1181->1149 1182->1181 1185->1155 1185->1156 1193->1185 1195 a6580c-a65810 1194->1195 1196 a6578b-a6578e 1194->1196 1195->1171 1196->1163 1197 a65790 1196->1197 1197->1193
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                        • String ID:
                        • API String ID: 1559183368-0
                        • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                        • Instruction ID: 7a0b56702d11da67212ebfedc631f7e90b8065a62b7427cb0af76d048957cca2
                        • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                        • Instruction Fuzzy Hash: 58518034E00B05DFDB289FB9C98466EB7B6AF41320F688B29F839962D0D7709D51DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A44F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00B062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A44F6F
                        • _free.LIBCMT ref: 00A7E68C
                        • _free.LIBCMT ref: 00A7E6D3
                          • Part of subcall function 00A46BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A46D0D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _free$CurrentDirectoryLibraryLoad
                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                        • API String ID: 2861923089-1757145024
                        • Opcode ID: 6794f652727cc25a04896b9791f28df57cc9bc473829c796df4df05f22d8a6d1
                        • Instruction ID: 8add4222959a0ee4aa5b30544bef8a8680bfb6aae6d1644d09c87bb753f71656
                        • Opcode Fuzzy Hash: 6794f652727cc25a04896b9791f28df57cc9bc473829c796df4df05f22d8a6d1
                        • Instruction Fuzzy Hash: 4A917C75910219AFCF04EFA4CD919EDB7B5FF19314F14846AF81AAB291EB30AD05CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00A435A1,SwapMouseButtons,00000004,?), ref: 00A435D4
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00A435A1,SwapMouseButtons,00000004,?,?,?,?,00A42754), ref: 00A435F5
                        • RegCloseKey.KERNELBASE(00000000,?,?,00A435A1,SwapMouseButtons,00000004,?,?,?,?,00A42754), ref: 00A43617
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: 79ab1e0bb513b6c25bb6d4b7ef4444fdde58e455caeb8c97e0ec0c28ce7ef587
                        • Instruction ID: d9e6cde46691b6d32844f2701cb5dd5318b7b45a7870e69bb3c766d1ecd96424
                        • Opcode Fuzzy Hash: 79ab1e0bb513b6c25bb6d4b7ef4444fdde58e455caeb8c97e0ec0c28ce7ef587
                        • Instruction Fuzzy Hash: 0911487A510209BFDF20DFA4DC40DAFF7B9EF44740F128469E805D7210E2719E419760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 014E1B2D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 014E1B51
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 014E1B73
                        Memory Dump Source
                        • Source File: 00000000.00000002.1285630358.00000000014E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_14e0000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                        • Instruction ID: 45b2d46e4ed89208d494dfe900a95663cc9ba0c640f4a52ea7494d628888661b
                        • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                        • Instruction Fuzzy Hash: 72622D30A14258DBEB24CFA4C844BDEB376EF58701F1091A9D10DEB3A0E7759E81CB59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A45045: _fseek.LIBCMT ref: 00A4505D
                          • Part of subcall function 00AA99BE: _wcscmp.LIBCMT ref: 00AA9AAE
                          • Part of subcall function 00AA99BE: _wcscmp.LIBCMT ref: 00AA9AC1
                        • _free.LIBCMT ref: 00AA992C
                        • _free.LIBCMT ref: 00AA9933
                        • _free.LIBCMT ref: 00AA999E
                          • Part of subcall function 00A62F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00A69C64), ref: 00A62FA9
                          • Part of subcall function 00A62F95: GetLastError.KERNEL32(00000000,?,00A69C64), ref: 00A62FBB
                        • _free.LIBCMT ref: 00AA99A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                        • String ID:
                        • API String ID: 1552873950-0
                        • Opcode ID: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                        • Instruction ID: 0f7a8da11a9d8636ebe90636b5b797314500b22c27c8b9f1ea492f2c831475e9
                        • Opcode Fuzzy Hash: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                        • Instruction Fuzzy Hash: 765173B5D04618AFDF249F64CC41A9EBBB9EF89310F1004AEF609A7281DB755E90CF58
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                        • String ID:
                        • API String ID: 2782032738-0
                        • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                        • Instruction ID: 74af21e6ac22067039ee174c9889bbee5e17331d649dd8f98242b6713afd1ecf
                        • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                        • Instruction Fuzzy Hash: 9141C675640705AFDF28DFA9C9809AF7BBAEF983A0B24817DE855C7680D770DD408B44
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00A7EE62
                        • GetOpenFileNameW.COMDLG32(?), ref: 00A7EEAC
                          • Part of subcall function 00A448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A448A1,?,?,00A437C0,?), ref: 00A448CE
                          • Part of subcall function 00A609D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A609F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen_memset
                        • String ID: X
                        • API String ID: 3777226403-3081909835
                        • Opcode ID: 285d15ac13ad416ea456d28899c6b8401543ebbd6c1273ff7a9ae250a169f3d0
                        • Instruction ID: c7a0763eeca8062e460c6ad6bf59ee2533a1d615958dc73b9b8d3fd091464244
                        • Opcode Fuzzy Hash: 285d15ac13ad416ea456d28899c6b8401543ebbd6c1273ff7a9ae250a169f3d0
                        • Instruction Fuzzy Hash: 0221C331A102989BCF05DF94CC45BEE7BF99F89300F00805AF508E7281DBB4598A8FA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __fread_nolock_memmove
                        • String ID: EA06
                        • API String ID: 1988441806-3962188686
                        • Opcode ID: fadb3e77fdc5180d6b677eeb01d48ecca2ecefb764c28eabc707e4f9e14c4eaf
                        • Instruction ID: 6eb7800b2aaeaa09cfc5a9aa26f6b1e50a56383022840a7286b1209c4fbfed29
                        • Opcode Fuzzy Hash: fadb3e77fdc5180d6b677eeb01d48ecca2ecefb764c28eabc707e4f9e14c4eaf
                        • Instruction Fuzzy Hash: 3601B972D042587EDB28C7A8CC56EFEBBF8DB15301F00459EF552D3581E575A60497A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetTempPathW.KERNEL32(00000104,?), ref: 00AA9B82
                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00AA9B99
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: 5d1456be31c6866d941f1bf610d20ce9256f8e0e5409608eef0b2618307b9d50
                        • Instruction ID: 3a1536dfd45a09aebc74e79be0194b93c208f780a2777669238ac6ca17545f35
                        • Opcode Fuzzy Hash: 5d1456be31c6866d941f1bf610d20ce9256f8e0e5409608eef0b2618307b9d50
                        • Instruction Fuzzy Hash: 1FD05E7A54030DBFDB10DBD0DC0EFEABB2CE704701F0046A1BF54920A1DEB055998B91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b1c3d1c968c2d4c97e7202ad1cdc77d89ff32b674c8cd748d0f62c7e652076ea
                        • Instruction ID: a8105248eac7755958fad43b65984cb2b473a603065abe2b54c40d27147df34c
                        • Opcode Fuzzy Hash: b1c3d1c968c2d4c97e7202ad1cdc77d89ff32b674c8cd748d0f62c7e652076ea
                        • Instruction Fuzzy Hash: A5F14B746083419FC714DF28C584AAABBE9FF88314F14892DF8999B352D731E945CF82
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A603A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A603D3
                          • Part of subcall function 00A603A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00A603DB
                          • Part of subcall function 00A603A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A603E6
                          • Part of subcall function 00A603A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A603F1
                          • Part of subcall function 00A603A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00A603F9
                          • Part of subcall function 00A603A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00A60401
                          • Part of subcall function 00A56259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00A4FA90), ref: 00A562B4
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00A4FB2D
                        • OleInitialize.OLE32(00000000), ref: 00A4FBAA
                        • CloseHandle.KERNEL32(00000000), ref: 00A849F2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID:
                        • API String ID: 1986988660-0
                        • Opcode ID: bd06d87c97c034bffa321d4d21a43f156957ffb70ec2010006cca7541abf83c5
                        • Instruction ID: 7bd820eea8ad06accae4e8c5aff85fdb4571123309706a78334d0466d5037cce
                        • Opcode Fuzzy Hash: bd06d87c97c034bffa321d4d21a43f156957ffb70ec2010006cca7541abf83c5
                        • Instruction Fuzzy Hash: 3B81AAB49012408ED788DF39EE956197BE5FBB9308710817AD419CB3B2EF318869CF55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00A44401
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A444A6
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A444C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$_memset
                        • String ID:
                        • API String ID: 1505330794-0
                        • Opcode ID: 83c66443027759eadeee3f7039e3a4d0c74c1724c17904d0c9811de6e1dd40ec
                        • Instruction ID: 8ace882ca776c390e13023cb4689445fafdca8fc34e744ad59622d5ee750902a
                        • Opcode Fuzzy Hash: 83c66443027759eadeee3f7039e3a4d0c74c1724c17904d0c9811de6e1dd40ec
                        • Instruction Fuzzy Hash: CD3182B55057018FD720DF74D884B9BBBF8FB99314F00092EF59A83251EB75A948CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __FF_MSGBANNER.LIBCMT ref: 00A65963
                          • Part of subcall function 00A6A3AB: __NMSG_WRITE.LIBCMT ref: 00A6A3D2
                          • Part of subcall function 00A6A3AB: __NMSG_WRITE.LIBCMT ref: 00A6A3DC
                        • __NMSG_WRITE.LIBCMT ref: 00A6596A
                          • Part of subcall function 00A6A408: GetModuleFileNameW.KERNEL32(00000000,00B043BA,00000104,?,00000001,00000000), ref: 00A6A49A
                          • Part of subcall function 00A6A408: ___crtMessageBoxW.LIBCMT ref: 00A6A548
                          • Part of subcall function 00A632DF: ___crtCorExitProcess.LIBCMT ref: 00A632E5
                          • Part of subcall function 00A632DF: ExitProcess.KERNEL32 ref: 00A632EE
                          • Part of subcall function 00A68D68: __getptd_noexit.LIBCMT ref: 00A68D68
                        • RtlAllocateHeap.NTDLL(01520000,00000000,00000001,00000000,?,?,?,00A61013,?), ref: 00A6598F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                        • String ID:
                        • API String ID: 1372826849-0
                        • Opcode ID: cf82e6decb0bc9177630beed8b4d16ede0b27afd8025a30ae0d34f9f1a202a33
                        • Instruction ID: 177c63152a2aaa888c0173c40fb610369e9ebc3dd6b04e68e17ce3cb0d1924a7
                        • Opcode Fuzzy Hash: cf82e6decb0bc9177630beed8b4d16ede0b27afd8025a30ae0d34f9f1a202a33
                        • Instruction Fuzzy Hash: 5401F133740B15DEEA253B74ED42A6E72B88F62730F10052AF601AB2C2DE709D428670
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00AA97D2,?,?,?,?,?,00000004), ref: 00AA9B45
                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00AA97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00AA9B5B
                        • CloseHandle.KERNEL32(00000000,?,00AA97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00AA9B62
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: File$CloseCreateHandleTime
                        • String ID:
                        • API String ID: 3397143404-0
                        • Opcode ID: 654e1ada556fe5780cc296a1cd9a184870d233219cd2be6be596c9f5d76b8c7e
                        • Instruction ID: c9b73761987304c1553993ac5b08af6373e41a8fa2ca291bd61c9f9942210ab1
                        • Opcode Fuzzy Hash: 654e1ada556fe5780cc296a1cd9a184870d233219cd2be6be596c9f5d76b8c7e
                        • Instruction Fuzzy Hash: F3E08632181214BBDB216B94EC09FCA7B19AB05761F154220FB246D0E0C7B125129798
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _free.LIBCMT ref: 00AA8FA5
                          • Part of subcall function 00A62F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00A69C64), ref: 00A62FA9
                          • Part of subcall function 00A62F95: GetLastError.KERNEL32(00000000,?,00A69C64), ref: 00A62FBB
                        • _free.LIBCMT ref: 00AA8FB6
                        • _free.LIBCMT ref: 00AA8FC8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                        • Instruction ID: aecd158016cbf726314a3814136b82f58963ee0ba19505568d5f9c886bd22d8e
                        • Opcode Fuzzy Hash: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                        • Instruction Fuzzy Hash: 58E012A1A09B024ECA24A678AE44B9757FE5F49351718081DB40ADB182DF28E8518224
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID: CALL
                        • API String ID: 0-4196123274
                        • Opcode ID: 165051c6f134b18247f8075a4fffc9e583d61a1883e0f7187a69c0ed035c084d
                        • Instruction ID: b29179f7e11b26a6e14198fcfce5b74c5a575a7d565d136284faa50f68681fbb
                        • Opcode Fuzzy Hash: 165051c6f134b18247f8075a4fffc9e583d61a1883e0f7187a69c0ed035c084d
                        • Instruction Fuzzy Hash: 5A224978608251CFCB64DF14C594B2ABBF1BF94300F15896DE89A8B362D731ED85CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID: EA06
                        • API String ID: 4104443479-3962188686
                        • Opcode ID: 6755f1cf032cddb742f7213847613567ef1938dbf04b89521bdef1f72485c3dd
                        • Instruction ID: b3ac300a3bcab1c0298c1a706d02d75dac1c34f0f99720423ec0420a7a72c706
                        • Opcode Fuzzy Hash: 6755f1cf032cddb742f7213847613567ef1938dbf04b89521bdef1f72485c3dd
                        • Instruction Fuzzy Hash: 91415979E04158ABDF219F7489637FE7FB6AFC9300F284075F8829B283C6219D4483A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • IsThemeActive.UXTHEME ref: 00A44992
                          • Part of subcall function 00A635AC: __lock.LIBCMT ref: 00A635B2
                          • Part of subcall function 00A635AC: DecodePointer.KERNEL32(00000001,?,00A449A7,00A981BC), ref: 00A635BE
                          • Part of subcall function 00A635AC: EncodePointer.KERNEL32(?,?,00A449A7,00A981BC), ref: 00A635C9
                          • Part of subcall function 00A44A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00A44A73
                          • Part of subcall function 00A44A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A44A88
                          • Part of subcall function 00A43B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A43B7A
                          • Part of subcall function 00A43B4C: IsDebuggerPresent.KERNEL32 ref: 00A43B8C
                          • Part of subcall function 00A43B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00B062F8,00B062E0,?,?), ref: 00A43BFD
                          • Part of subcall function 00A43B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00A43C81
                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A449D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                        • String ID:
                        • API String ID: 1438897964-0
                        • Opcode ID: 494c6dd82cb358ded1f19d48551e3322c41dbf7c44dd80cdb9913180980ee494
                        • Instruction ID: 2a96e7b2950d4de05accbc2b2807c57e42c72f355aba7e66bf6dc46a0b90ba95
                        • Opcode Fuzzy Hash: 494c6dd82cb358ded1f19d48551e3322c41dbf7c44dd80cdb9913180980ee494
                        • Instruction Fuzzy Hash: 2C118C719083119FC700DF28DD4590BFBF8EBA8750F00852EF045832A1DF709566CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00A45981,?,?,?,?), ref: 00A45E27
                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00A45981,?,?,?,?), ref: 00A7E19C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 3eb6ff3cab2a95e2c904eaea8a64e6119f92f89f77f1adb7f836de2cdaec0eec
                        • Instruction ID: 1a65a818e3b414f81a4f8a7d82c44fd4b4c8c8bb9418dbcbaf875a0521987d1d
                        • Opcode Fuzzy Hash: 3eb6ff3cab2a95e2c904eaea8a64e6119f92f89f77f1adb7f836de2cdaec0eec
                        • Instruction Fuzzy Hash: 35019E74644708BFF3254F24CC8BF663A9CAB05768F14C318BAE96A1E1C6B01E458B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A6594C: __FF_MSGBANNER.LIBCMT ref: 00A65963
                          • Part of subcall function 00A6594C: __NMSG_WRITE.LIBCMT ref: 00A6596A
                          • Part of subcall function 00A6594C: RtlAllocateHeap.NTDLL(01520000,00000000,00000001,00000000,?,?,?,00A61013,?), ref: 00A6598F
                        • std::exception::exception.LIBCMT ref: 00A6102C
                        • __CxxThrowException@8.LIBCMT ref: 00A61041
                          • Part of subcall function 00A687DB: RaiseException.KERNEL32(?,?,?,00AFBAF8,00000000,?,?,?,?,00A61046,?,00AFBAF8,?,00000001), ref: 00A68830
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                        • String ID:
                        • API String ID: 3902256705-0
                        • Opcode ID: 4f318d6f37c8cdeae6d04e2311e81c348f1e06c3b848be3b50725ea2a8d09f53
                        • Instruction ID: 0685922de3fa9c25d0dca47ab5c5793bf2fbd521b9fa22a4d2d1248a3e26fdfb
                        • Opcode Fuzzy Hash: 4f318d6f37c8cdeae6d04e2311e81c348f1e06c3b848be3b50725ea2a8d09f53
                        • Instruction Fuzzy Hash: 11F0C83954021DA7CF20BBA8ED05ADF7BBC9F10351F140566F80596691EFB19A80D2E0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __lock_file_memset
                        • String ID:
                        • API String ID: 26237723-0
                        • Opcode ID: f6671655f4df11a7cd20f153fe21d33e953cf54daf20f3fb14de2b3c6db0cb34
                        • Instruction ID: ba6da830e00448fe6d9c68c33d6835af065af79245b6803ea616445cd53a278b
                        • Opcode Fuzzy Hash: f6671655f4df11a7cd20f153fe21d33e953cf54daf20f3fb14de2b3c6db0cb34
                        • Instruction Fuzzy Hash: D001A771C00608EBCF12AF79CD0159F7B75AF80760F148315F8145B1A1DB358A11EB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A68D68: __getptd_noexit.LIBCMT ref: 00A68D68
                        • __lock_file.LIBCMT ref: 00A6561B
                          • Part of subcall function 00A66E4E: __lock.LIBCMT ref: 00A66E71
                        • __fclose_nolock.LIBCMT ref: 00A65626
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                        • String ID:
                        • API String ID: 2800547568-0
                        • Opcode ID: e50efc408c1fd724d667b8f27366bd128d7086ea15f28c163c3bee064a7002bd
                        • Instruction ID: 1070318b62323c8e087e181d1f87bf4c3260594a7765fa829167fa8acb6bb964
                        • Opcode Fuzzy Hash: e50efc408c1fd724d667b8f27366bd128d7086ea15f28c163c3bee064a7002bd
                        • Instruction Fuzzy Hash: 22F0BE75C00A059ADB20AF79CA0276E7BF56F41734F698209B425AB1C1CF7C8A42DB55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 014E1B2D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 014E1B51
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 014E1B73
                        Memory Dump Source
                        • Source File: 00000000.00000002.1285630358.00000000014E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_14e0000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                        • Instruction ID: caf1038da7d66bfb4451e50b665174c73ba1ba1dfff44cb5e11473d1e355a011
                        • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                        • Instruction Fuzzy Hash: 1012ED24E24658C6EB24DF64D8507DEB272EF68301F1090E9910DEB7A4E77A4F81CF5A
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8c502333a63c5187f5dfc21b216ee9bb08546162928b1d1484ba3039136a17fe
                        • Instruction ID: 3ff8dd6b1bddf4e88fdf2f8f3db1a2e917116ddc67db826ad79180c5ffc19469
                        • Opcode Fuzzy Hash: 8c502333a63c5187f5dfc21b216ee9bb08546162928b1d1484ba3039136a17fe
                        • Instruction Fuzzy Hash: 76619C7860020A9FDB10EF64C981AABB7F5EF88300F24857DE9069B251EB71ED51CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5dcb027d4c1d96f301d58f449e56d401328e190629ef56539bb4ccd179894f9b
                        • Instruction ID: bb783c396c42ec20d77f3c211d06b1c364a2cdd322fcdba07a912725429451b2
                        • Opcode Fuzzy Hash: 5dcb027d4c1d96f301d58f449e56d401328e190629ef56539bb4ccd179894f9b
                        • Instruction Fuzzy Hash: 43515E39A00604AFDF14EB64CA95FAE77B6BF85750F148168F946AB292CB30ED04CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: 137ddfd0232708e3b58a8764eb2c3eda55301eb74d4565348677704d51d6fb2f
                        • Instruction ID: 8d4a47dadeadec64076be4a1b1f9fa9d95cd75c74e238d68d6ff69137416786a
                        • Opcode Fuzzy Hash: 137ddfd0232708e3b58a8764eb2c3eda55301eb74d4565348677704d51d6fb2f
                        • Instruction Fuzzy Hash: 5F31C17D608A42DFC724DF18C590E26F7B0FF88320B55C569E98A8B765E730E881CB80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00A45CF6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: c8df081e666f3f0245bbd74330a04d5eccf5ef796746c008f5be05eba2964f57
                        • Instruction ID: fc00989a9224cbcbbb29d64afca9b13de3cfcb64b97a7616609b8dad103de9f6
                        • Opcode Fuzzy Hash: c8df081e666f3f0245bbd74330a04d5eccf5ef796746c008f5be05eba2964f57
                        • Instruction Fuzzy Hash: AB313975E00B0AAFCB18DF69C484AADB7B5FF88310F148629E81993711D771AD60DB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: fa917d1eeef47664691eafc2f22199cd2bf94cf2f72cde28703f8b90baf5994b
                        • Instruction ID: 4218e19906379e7b4d27bbc69636128c6ade86e13438d7d21f3ae7347aeada1f
                        • Opcode Fuzzy Hash: fa917d1eeef47664691eafc2f22199cd2bf94cf2f72cde28703f8b90baf5994b
                        • Instruction Fuzzy Hash: 8241F578508351CFDB24DF14C584B1ABBE1BF85318F1989ACE8994B762C332E859CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcscmp
                        • String ID:
                        • API String ID: 856254489-0
                        • Opcode ID: 567a9ad9591763d0f9e57d0794c701499023c7811d2ed262c4b2a908c8283b1b
                        • Instruction ID: dd360d62bf4a265be302daec2209feb72f026bfc0195f6ed821ab1ab064d2532
                        • Opcode Fuzzy Hash: 567a9ad9591763d0f9e57d0794c701499023c7811d2ed262c4b2a908c8283b1b
                        • Instruction Fuzzy Hash: CC116076D05219DBCB14EBA9DD819EEF778EF95360F104126E815A7190EB309D06CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A44D13: FreeLibrary.KERNEL32(00000000,?), ref: 00A44D4D
                          • Part of subcall function 00A6548B: __wfsopen.LIBCMT ref: 00A65496
                        • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00B062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A44F6F
                          • Part of subcall function 00A44CC8: FreeLibrary.KERNEL32(00000000), ref: 00A44D02
                          • Part of subcall function 00A44DD0: _memmove.LIBCMT ref: 00A44E1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Library$Free$Load__wfsopen_memmove
                        • String ID:
                        • API String ID: 1396898556-0
                        • Opcode ID: d502f44c47d0e69f48abf84f9a25541637999abba1caecee853adad2fb13f38e
                        • Instruction ID: 63b079d8e5dee902d1a3318104320253a0b45f921232c567d91faa3bbc15cd92
                        • Opcode Fuzzy Hash: d502f44c47d0e69f48abf84f9a25541637999abba1caecee853adad2fb13f38e
                        • Instruction Fuzzy Hash: E911E735A00705AFCB14EF70DD52FAE77B59FC8B00F10842DF541A61C2DEB19A059760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: 217ae741fa59efdaa4712f507f5a2c9c6aeadc1294a740cf47d90cbc6298cdaf
                        • Instruction ID: 49b0730e48511d77d846f939511f39b2a6b1b14b2509ed0edccaffb1e278cb57
                        • Opcode Fuzzy Hash: 217ae741fa59efdaa4712f507f5a2c9c6aeadc1294a740cf47d90cbc6298cdaf
                        • Instruction Fuzzy Hash: DE2110B8508351DFCB24DF54C445B1BBBF1BF88304F098968E99A4B761D731E859CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00A45807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00A45D76
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: eaa50fb25369be2293039eafbcd1f4900aee0f015be891b6b742ac0ea9b272ac
                        • Instruction ID: f300a4f3c27975c8a7e105d6f8fd64caeb07c55be869e9f6775a510ac9410ca5
                        • Opcode Fuzzy Hash: eaa50fb25369be2293039eafbcd1f4900aee0f015be891b6b742ac0ea9b272ac
                        • Instruction Fuzzy Hash: 96113A39A00B059FD730CF25C888B62B7F5EF85750F14C92EE5AA86A51D7B0E945CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcscmp
                        • String ID:
                        • API String ID: 856254489-0
                        • Opcode ID: 0424eb7d6315625d0720b2b8ae597d015624c452d5ace5889a8e5ecdcad9a985
                        • Instruction ID: a5cb0a7f3f9403530b99133ee91270c68c2125e631602eb8e341e0b39987a07e
                        • Opcode Fuzzy Hash: 0424eb7d6315625d0720b2b8ae597d015624c452d5ace5889a8e5ecdcad9a985
                        • Instruction Fuzzy Hash: 2101283AD053955FEB05DB68C8916AEFF74DFD7360F15409AD850AB2A2D3349C42CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __lock_file.LIBCMT ref: 00A64AD6
                          • Part of subcall function 00A68D68: __getptd_noexit.LIBCMT ref: 00A68D68
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __getptd_noexit__lock_file
                        • String ID:
                        • API String ID: 2597487223-0
                        • Opcode ID: 38aaccadf9135fcdeea1d21bf837f0892f5ddfb4f444c129ebd22e469f43feac
                        • Instruction ID: 035eaf8ebc4d8c197f5c94444e19734054ad03e6340bddc2f018a7a7cf304fdd
                        • Opcode Fuzzy Hash: 38aaccadf9135fcdeea1d21bf837f0892f5ddfb4f444c129ebd22e469f43feac
                        • Instruction Fuzzy Hash: F5F0C231980209EBDF61AFB4CD063AF36B5AF14765F048614F424AA1D1CB7C8A50DF55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FreeLibrary.KERNEL32(?,?,00B062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A44FDE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 59395e8f713c858027f9e02a029dfcaed80443da7ad89b65fc86e4c655c91ce4
                        • Instruction ID: fddeeb501db5b283b0bbcd5daa5d0eb68d6f0a0381cc5ce65e74a5bbc3905ba3
                        • Opcode Fuzzy Hash: 59395e8f713c858027f9e02a029dfcaed80443da7ad89b65fc86e4c655c91ce4
                        • Instruction Fuzzy Hash: B6F06DB9509B12CFCB349F74E494912BBF1BF487293248A3EE5D782610C731A848DF40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A609F4
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: LongNamePath_memmove
                        • String ID:
                        • API String ID: 2514874351-0
                        • Opcode ID: a24d4a89ca007d2a170be75085d9ed0ab8fc346409668c1ccc43d9057679f50b
                        • Instruction ID: 7b84a206a4c58e62245665e44ffa1df561785707a400bf941260e661c6bff0aa
                        • Opcode Fuzzy Hash: a24d4a89ca007d2a170be75085d9ed0ab8fc346409668c1ccc43d9057679f50b
                        • Instruction Fuzzy Hash: 06E0CD36D042285BC720D69C9C05FFA77EDDFC8791F0541B5FC0CD7204E9609C818690
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __fread_nolock
                        • String ID:
                        • API String ID: 2638373210-0
                        • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                        • Instruction ID: da98149da2297c9acebeb4444a5d0eb504ca20a861062dd6a697086af6d5959f
                        • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                        • Instruction Fuzzy Hash: 0DE092B0504B005FD7748B24D8107E373E0AB06315F00091CF29A83341EB6278418759
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00A7E16B,?,?,00000000), ref: 00A45DBF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: b6964db9c224bc4e5dc7e1306728d48471963f910a84ff778fea7f939b7d3efd
                        • Instruction ID: eb5a1383b2026934ed3a6f1b071920528ca15781093ed142778592a107ea2571
                        • Opcode Fuzzy Hash: b6964db9c224bc4e5dc7e1306728d48471963f910a84ff778fea7f939b7d3efd
                        • Instruction Fuzzy Hash: CBD0C77464020CBFE710DB80DC46FA9777DD705710F100294FE0456290D6B27D508795
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __wfsopen
                        • String ID:
                        • API String ID: 197181222-0
                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                        • Instruction ID: 42fd946452add5b4cd7813f442eab479ae25475e164adae14c14262ba247f50c
                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                        • Instruction Fuzzy Hash: 8CB0927684020C77DE012E92EC02A593B2A9B40678F808060FB0C18162AA73E6A09689
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetLastError.KERNEL32(00000002,00000000), ref: 00AAD46A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 2ce62229de3f0b8660801b3a65b9aa7b4b8feefdb005b6a18b25d2cc350cc183
                        • Instruction ID: 98c7638b73a4c434e71fe4bc91bf53499b5c0a45fb148c83a39f5ec0cfcc08b6
                        • Opcode Fuzzy Hash: 2ce62229de3f0b8660801b3a65b9aa7b4b8feefdb005b6a18b25d2cc350cc183
                        • Instruction Fuzzy Hash: DA715E346083428FCB14EF24C591A6EB7E0AF89754F04496DF8969B6A2DB30ED49CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction ID: 1eb2c298fb4fcbe27c4f6cdbdc8c4483724de7f96b882f8917dd1ae31610a829
                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction Fuzzy Hash: B131C371A00115DFC718DF58D48096AF7B6FF59300B688AA5E40ACB651EB32EDC1CBC0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • Sleep.KERNELBASE(000001F4), ref: 014E2311
                        Memory Dump Source
                        • Source File: 00000000.00000002.1285630358.00000000014E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_14e0000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction ID: 8161d6ad788b21cdea1700c9e404b0683cfc076580ebfbd7bf85d9537df864b1
                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction Fuzzy Hash: E7E0E67594010DDFDB00EFB4D64D6AE7FF4EF04302F100561FD01D2281D6709D508A62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00ACCE50
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00ACCE91
                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00ACCED6
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00ACCF00
                        • SendMessageW.USER32 ref: 00ACCF29
                        • _wcsncpy.LIBCMT ref: 00ACCFA1
                        • GetKeyState.USER32(00000011), ref: 00ACCFC2
                        • GetKeyState.USER32(00000009), ref: 00ACCFCF
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00ACCFE5
                        • GetKeyState.USER32(00000010), ref: 00ACCFEF
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00ACD018
                        • SendMessageW.USER32 ref: 00ACD03F
                        • SendMessageW.USER32(?,00001030,?,00ACB602), ref: 00ACD145
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00ACD15B
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00ACD16E
                        • SetCapture.USER32(?), ref: 00ACD177
                        • ClientToScreen.USER32(?,?), ref: 00ACD1DC
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00ACD1E9
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00ACD203
                        • ReleaseCapture.USER32 ref: 00ACD20E
                        • GetCursorPos.USER32(?), ref: 00ACD248
                        • ScreenToClient.USER32(?,?), ref: 00ACD255
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00ACD2B1
                        • SendMessageW.USER32 ref: 00ACD2DF
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00ACD31C
                        • SendMessageW.USER32 ref: 00ACD34B
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00ACD36C
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00ACD37B
                        • GetCursorPos.USER32(?), ref: 00ACD39B
                        • ScreenToClient.USER32(?,?), ref: 00ACD3A8
                        • GetParent.USER32(?), ref: 00ACD3C8
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00ACD431
                        • SendMessageW.USER32 ref: 00ACD462
                        • ClientToScreen.USER32(?,?), ref: 00ACD4C0
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00ACD4F0
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00ACD51A
                        • SendMessageW.USER32 ref: 00ACD53D
                        • ClientToScreen.USER32(?,?), ref: 00ACD58F
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00ACD5C3
                          • Part of subcall function 00A425DB: GetWindowLongW.USER32(?,000000EB), ref: 00A425EC
                        • GetWindowLongW.USER32(?,000000F0), ref: 00ACD65F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                        • String ID: @GUI_DRAGID$F
                        • API String ID: 3977979337-4164748364
                        • Opcode ID: e67abe7e7a7269cb6db14e008aab3b1a98969101d608b6589b627b3dd71718e1
                        • Instruction ID: b9598fd849c555ea0bf128069900944dcdb4488ed68494852632dc06a8dbbc6f
                        • Opcode Fuzzy Hash: e67abe7e7a7269cb6db14e008aab3b1a98969101d608b6589b627b3dd71718e1
                        • Instruction Fuzzy Hash: 5A429C34204341AFD725CF68C844FAABBE6FF49324F16052DF699972A1DB31A851CF92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00AC873F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: %d/%02d/%02d
                        • API String ID: 3850602802-328681919
                        • Opcode ID: 699acc9fdd6d1ae1622acc2a23cab5d2ea17f2a5e1a6618fbb87abf004dba9b1
                        • Instruction ID: 244556a1de8aa500d05fee9d2e6c22fa2b9d4e9bdc08198ce8f272c7fa31943a
                        • Opcode Fuzzy Hash: 699acc9fdd6d1ae1622acc2a23cab5d2ea17f2a5e1a6618fbb87abf004dba9b1
                        • Instruction Fuzzy Hash: CF12BF71500248AFEB258F64CC49FAB7BF9FB85710F26412DF915EA2A1EF789941CB10
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memmove$_memset
                        • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                        • API String ID: 1357608183-1798697756
                        • Opcode ID: d6e4415777ecd3f583d2da095751d1ed674f95a248fee386ed779ef36335e50a
                        • Instruction ID: 8199032791d07539df7b1d27ed83d3d896541cbf6bc867009b45c1c7425c0b97
                        • Opcode Fuzzy Hash: d6e4415777ecd3f583d2da095751d1ed674f95a248fee386ed779ef36335e50a
                        • Instruction Fuzzy Hash: AD937F75B0421ADBDF24CF98D881BADB7F1FF48710F25816AE955AB280E7749E81CB40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetForegroundWindow.USER32(00000000,?), ref: 00A44A3D
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A7DA8E
                        • IsIconic.USER32(?), ref: 00A7DA97
                        • ShowWindow.USER32(?,00000009), ref: 00A7DAA4
                        • SetForegroundWindow.USER32(?), ref: 00A7DAAE
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A7DAC4
                        • GetCurrentThreadId.KERNEL32 ref: 00A7DACB
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A7DAD7
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A7DAE8
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A7DAF0
                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 00A7DAF8
                        • SetForegroundWindow.USER32(?), ref: 00A7DAFB
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7DB10
                        • keybd_event.USER32(00000012,00000000), ref: 00A7DB1B
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7DB25
                        • keybd_event.USER32(00000012,00000000), ref: 00A7DB2A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7DB33
                        • keybd_event.USER32(00000012,00000000), ref: 00A7DB38
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7DB42
                        • keybd_event.USER32(00000012,00000000), ref: 00A7DB47
                        • SetForegroundWindow.USER32(?), ref: 00A7DB4A
                        • AttachThreadInput.USER32(?,?,00000000), ref: 00A7DB71
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: 80706ab7167240471ec6c912488bbe7627d73cd83a11a561c9d51e2d60b7940d
                        • Instruction ID: f6a8226b02109261e51457968685e3d15701d16e79cefe1fc429472396231be5
                        • Opcode Fuzzy Hash: 80706ab7167240471ec6c912488bbe7627d73cd83a11a561c9d51e2d60b7940d
                        • Instruction Fuzzy Hash: BF313571A403187FEB21AFA19C49F7F7E7DEF84B50F128025FA04EA1D1D6705911AAA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A98CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A98D0D
                          • Part of subcall function 00A98CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A98D3A
                          • Part of subcall function 00A98CC3: GetLastError.KERNEL32 ref: 00A98D47
                        • _memset.LIBCMT ref: 00A9889B
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00A988ED
                        • CloseHandle.KERNEL32(?), ref: 00A988FE
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A98915
                        • GetProcessWindowStation.USER32 ref: 00A9892E
                        • SetProcessWindowStation.USER32(00000000), ref: 00A98938
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A98952
                          • Part of subcall function 00A98713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A98851), ref: 00A98728
                          • Part of subcall function 00A98713: CloseHandle.KERNEL32(?,?,00A98851), ref: 00A9873A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                        • String ID: $default$winsta0
                        • API String ID: 2063423040-1027155976
                        • Opcode ID: 357a04135689b44d2a8ac1e27caf6f631c99edac96b18bed0f9574a4e9218adf
                        • Instruction ID: b2776af5f26365727ca2b71c83c11745295bfeb48021a9f79a4253fa88c6765e
                        • Opcode Fuzzy Hash: 357a04135689b44d2a8ac1e27caf6f631c99edac96b18bed0f9574a4e9218adf
                        • Instruction Fuzzy Hash: FC817771A00249BFDF11DFA4CD45EEEBBB9EF05344F09412AF910A62A1DB398E15DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • OpenClipboard.USER32(00ACF910), ref: 00AB4284
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00AB4292
                        • GetClipboardData.USER32(0000000D), ref: 00AB429A
                        • CloseClipboard.USER32 ref: 00AB42A6
                        • GlobalLock.KERNEL32(00000000), ref: 00AB42C2
                        • CloseClipboard.USER32 ref: 00AB42CC
                        • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00AB42E1
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00AB42EE
                        • GetClipboardData.USER32(00000001), ref: 00AB42F6
                        • GlobalLock.KERNEL32(00000000), ref: 00AB4303
                        • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00AB4337
                        • CloseClipboard.USER32 ref: 00AB4447
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                        • String ID:
                        • API String ID: 3222323430-0
                        • Opcode ID: bdeed0e438ce67244811069deb11bc7ab35a57b5492b52ca229cca94ccc3ff6a
                        • Instruction ID: d0b136eef0e34d9b1b5928365b8dfc36369418fb0b3768d659da49e18775b4cc
                        • Opcode Fuzzy Hash: bdeed0e438ce67244811069deb11bc7ab35a57b5492b52ca229cca94ccc3ff6a
                        • Instruction Fuzzy Hash: 34518C35204241AFD701EBA4ED86FAE77ADAF88B00F014529F596D61A3DF7099068A62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00AAC9F8
                        • FindClose.KERNEL32(00000000), ref: 00AACA4C
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AACA71
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AACA88
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00AACAAF
                        • __swprintf.LIBCMT ref: 00AACAFB
                        • __swprintf.LIBCMT ref: 00AACB3E
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                        • __swprintf.LIBCMT ref: 00AACB92
                          • Part of subcall function 00A638D8: __woutput_l.LIBCMT ref: 00A63931
                        • __swprintf.LIBCMT ref: 00AACBE0
                          • Part of subcall function 00A638D8: __flsbuf.LIBCMT ref: 00A63953
                          • Part of subcall function 00A638D8: __flsbuf.LIBCMT ref: 00A6396B
                        • __swprintf.LIBCMT ref: 00AACC2F
                        • __swprintf.LIBCMT ref: 00AACC7E
                        • __swprintf.LIBCMT ref: 00AACCCD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                        • API String ID: 3953360268-2428617273
                        • Opcode ID: 1a34fca1f74aed38c434b8a5aa782ec4a533dde237fafd0db546a1c587a44ec8
                        • Instruction ID: 58913a31869cde1486b96913436d8c0c07ed440ee9dcbb80b803681749e363de
                        • Opcode Fuzzy Hash: 1a34fca1f74aed38c434b8a5aa782ec4a533dde237fafd0db546a1c587a44ec8
                        • Instruction Fuzzy Hash: 0BA12EB6508344ABD700EFA4C985DAFB7ECEFD5700F404929B586D7192EB34DA09CB62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 00AAF221
                        • _wcscmp.LIBCMT ref: 00AAF236
                        • _wcscmp.LIBCMT ref: 00AAF24D
                        • GetFileAttributesW.KERNEL32(?), ref: 00AAF25F
                        • SetFileAttributesW.KERNEL32(?,?), ref: 00AAF279
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00AAF291
                        • FindClose.KERNEL32(00000000), ref: 00AAF29C
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00AAF2B8
                        • _wcscmp.LIBCMT ref: 00AAF2DF
                        • _wcscmp.LIBCMT ref: 00AAF2F6
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00AAF308
                        • SetCurrentDirectoryW.KERNEL32(00AFA5A0), ref: 00AAF326
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AAF330
                        • FindClose.KERNEL32(00000000), ref: 00AAF33D
                        • FindClose.KERNEL32(00000000), ref: 00AAF34F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1803514871-438819550
                        • Opcode ID: e5f3996a423b1faffbeae2722bef0dd9104c5761bb97cc8a983363c009fa1fb7
                        • Instruction ID: d947711431f568807ddc02124338a09684817ec1ee9baf510eacf96eb913cbfb
                        • Opcode Fuzzy Hash: e5f3996a423b1faffbeae2722bef0dd9104c5761bb97cc8a983363c009fa1fb7
                        • Instruction Fuzzy Hash: 2B31BF765002196EDF14DBF4DC48EEE73ACAF4A361F104675E924D70E0EB70DA468A60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AC0BDE
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00ACF910,00000000,?,00000000,?,?), ref: 00AC0C4C
                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00AC0C94
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00AC0D1D
                        • RegCloseKey.ADVAPI32(?), ref: 00AC103D
                        • RegCloseKey.ADVAPI32(00000000), ref: 00AC104A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Close$ConnectCreateRegistryValue
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 536824911-966354055
                        • Opcode ID: 03f9605202a29b55ca50748badfd22dbdb48e876380925c540b9fc31a437144c
                        • Instruction ID: 30fe5c918ff6acfad0b65089561ebb58dcc5bc843967c0183e30064d9c2741ed
                        • Opcode Fuzzy Hash: 03f9605202a29b55ca50748badfd22dbdb48e876380925c540b9fc31a437144c
                        • Instruction Fuzzy Hash: E20236752046119FCB14EF24C985E2AB7E5FF89714F05896DF88A9B362CB30ED41CB81
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 00AAF37E
                        • _wcscmp.LIBCMT ref: 00AAF393
                        • _wcscmp.LIBCMT ref: 00AAF3AA
                          • Part of subcall function 00AA45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00AA45DC
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00AAF3D9
                        • FindClose.KERNEL32(00000000), ref: 00AAF3E4
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00AAF400
                        • _wcscmp.LIBCMT ref: 00AAF427
                        • _wcscmp.LIBCMT ref: 00AAF43E
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00AAF450
                        • SetCurrentDirectoryW.KERNEL32(00AFA5A0), ref: 00AAF46E
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AAF478
                        • FindClose.KERNEL32(00000000), ref: 00AAF485
                        • FindClose.KERNEL32(00000000), ref: 00AAF497
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 1824444939-438819550
                        • Opcode ID: 66f72a54e39ec41598d35b73ef2dadee70d7217ea82d2efeef991497e35a675e
                        • Instruction ID: 03a356b81cbe5e39c02903ba1516042b5a754a1240d9e15a49db700f3a73120e
                        • Opcode Fuzzy Hash: 66f72a54e39ec41598d35b73ef2dadee70d7217ea82d2efeef991497e35a675e
                        • Instruction Fuzzy Hash: 3E31B1725012196FCF14EBE4EC88EEE77ADAF4A360F104275E824A71E0DB70DE45CA64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A9874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A98766
                          • Part of subcall function 00A9874A: GetLastError.KERNEL32(?,00A9822A,?,?,?), ref: 00A98770
                          • Part of subcall function 00A9874A: GetProcessHeap.KERNEL32(00000008,?,?,00A9822A,?,?,?), ref: 00A9877F
                          • Part of subcall function 00A9874A: HeapAlloc.KERNEL32(00000000,?,00A9822A,?,?,?), ref: 00A98786
                          • Part of subcall function 00A9874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A9879D
                          • Part of subcall function 00A987E7: GetProcessHeap.KERNEL32(00000008,00A98240,00000000,00000000,?,00A98240,?), ref: 00A987F3
                          • Part of subcall function 00A987E7: HeapAlloc.KERNEL32(00000000,?,00A98240,?), ref: 00A987FA
                          • Part of subcall function 00A987E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A98240,?), ref: 00A9880B
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A9825B
                        • _memset.LIBCMT ref: 00A98270
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A9828F
                        • GetLengthSid.ADVAPI32(?), ref: 00A982A0
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00A982DD
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A982F9
                        • GetLengthSid.ADVAPI32(?), ref: 00A98316
                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A98325
                        • HeapAlloc.KERNEL32(00000000), ref: 00A9832C
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A9834D
                        • CopySid.ADVAPI32(00000000), ref: 00A98354
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A98385
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A983AB
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A983BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                        • String ID:
                        • API String ID: 3996160137-0
                        • Opcode ID: c49ad1b024a1f06805d58155fd34eedf02517d3170d28f20eafde1e76adb3da4
                        • Instruction ID: f5e5347cd04b7ff9d07b07f86f55082b589160416ae36062e9610204e37f1346
                        • Opcode Fuzzy Hash: c49ad1b024a1f06805d58155fd34eedf02517d3170d28f20eafde1e76adb3da4
                        • Instruction Fuzzy Hash: F3614D71A04209EFDF00DF94DD84EEEBBB9FF05700F148169E915AA291DB399A05DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                        • API String ID: 0-4052911093
                        • Opcode ID: d1c1ba622a3af7e183b50dcc83aac507640b9dde02b979277d002adfd7df5bab
                        • Instruction ID: 40d0de8369a4f90dcdb813517d75dd35454b955f0373f3cce5d1d895e6e1258f
                        • Opcode Fuzzy Hash: d1c1ba622a3af7e183b50dcc83aac507640b9dde02b979277d002adfd7df5bab
                        • Instruction Fuzzy Hash: 5A727075E0021A9BDF24CF98C8807AEB7F5FF48310F55816AE949EB290EB749D45CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00AC10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AC0038,?,?), ref: 00AC10BC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AC0737
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00AC07D6
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00AC086E
                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00AC0AAD
                        • RegCloseKey.ADVAPI32(00000000), ref: 00AC0ABA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                        • String ID:
                        • API String ID: 1240663315-0
                        • Opcode ID: 1c278cbb6eb136ca626c6a6111495bdb38faaa08b28e66b297f6a42385d3ac09
                        • Instruction ID: 0efa86e4493cb00d213694d335e980864af68d534fbd27698f8b0843bd5c7e8f
                        • Opcode Fuzzy Hash: 1c278cbb6eb136ca626c6a6111495bdb38faaa08b28e66b297f6a42385d3ac09
                        • Instruction Fuzzy Hash: F7E14B35204210EFCB14DF24C985E6BBBF9FF89754B05896DF88ADB262DA30E905CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?), ref: 00AA0241
                        • GetAsyncKeyState.USER32(000000A0), ref: 00AA02C2
                        • GetKeyState.USER32(000000A0), ref: 00AA02DD
                        • GetAsyncKeyState.USER32(000000A1), ref: 00AA02F7
                        • GetKeyState.USER32(000000A1), ref: 00AA030C
                        • GetAsyncKeyState.USER32(00000011), ref: 00AA0324
                        • GetKeyState.USER32(00000011), ref: 00AA0336
                        • GetAsyncKeyState.USER32(00000012), ref: 00AA034E
                        • GetKeyState.USER32(00000012), ref: 00AA0360
                        • GetAsyncKeyState.USER32(0000005B), ref: 00AA0378
                        • GetKeyState.USER32(0000005B), ref: 00AA038A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: f77944b1a39148f40a06907081a8962df2c58f30ea8d7c0dbe7b3c1b821fdf5d
                        • Instruction ID: 4f137027c1d4224f1504b025be85c4610d2e7e0a88bf95697cb36e6e815408ab
                        • Opcode Fuzzy Hash: f77944b1a39148f40a06907081a8962df2c58f30ea8d7c0dbe7b3c1b821fdf5d
                        • Instruction Fuzzy Hash: 114189345047C96EFF319BA48808BF5BEA16F17344F08809DD7C64B1C2E79559C887B2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • CoInitialize.OLE32 ref: 00AB8718
                        • CoUninitialize.OLE32 ref: 00AB8723
                        • CoCreateInstance.OLE32(?,00000000,00000017,00AD2BEC,?), ref: 00AB8783
                        • IIDFromString.OLE32(?,?), ref: 00AB87F6
                        • VariantInit.OLEAUT32(?), ref: 00AB8890
                        • VariantClear.OLEAUT32(?), ref: 00AB88F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 834269672-1287834457
                        • Opcode ID: 5436893a62872888c14e86c54b16cae165cddd341b7336267dc029b4443ff756
                        • Instruction ID: da7ffb97465d6fb5db6a667107a05a561ddec91ed2d4d0580775b53bd07a1f7b
                        • Opcode Fuzzy Hash: 5436893a62872888c14e86c54b16cae165cddd341b7336267dc029b4443ff756
                        • Instruction Fuzzy Hash: 1D619074608301AFD710DFA8C944AABBBECAF89754F14481DF5859B292CB74ED44CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: 5036591a0a926da6b94536696da8c47a9a6c8746567571f0e70d76697ddab8e8
                        • Instruction ID: 0a3afa5201ccad302dc162e7d7bca850ab6dd0ba62288b025bf1d48abecaea18
                        • Opcode Fuzzy Hash: 5036591a0a926da6b94536696da8c47a9a6c8746567571f0e70d76697ddab8e8
                        • Instruction Fuzzy Hash: FE21AE353006109FDB10EFA4EC09FAA77A9EF48711F11802AF946DB2B2CB30AC12CB54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A448A1,?,?,00A437C0,?), ref: 00A448CE
                          • Part of subcall function 00AA4CD3: GetFileAttributesW.KERNEL32(?,00AA3947), ref: 00AA4CD4
                        • FindFirstFileW.KERNEL32(?,?), ref: 00AA3ADF
                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00AA3B87
                        • MoveFileW.KERNEL32(?,?), ref: 00AA3B9A
                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00AA3BB7
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AA3BD9
                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00AA3BF5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 4002782344-1173974218
                        • Opcode ID: c8c7e12a88a8949db2aedd5b70253f6bb82439b371ab018197bae9389eebe506
                        • Instruction ID: 6932a8c03c8e36607d5ec6970378a95ede68300c2c0452ca445a17528a07b17d
                        • Opcode Fuzzy Hash: c8c7e12a88a8949db2aedd5b70253f6bb82439b371ab018197bae9389eebe506
                        • Instruction Fuzzy Hash: 78517036801258AFCF15EBA0CE929EDB779AF56300F644169F44277092DF316F09CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00AAF6AB
                        • Sleep.KERNEL32(0000000A), ref: 00AAF6DB
                        • _wcscmp.LIBCMT ref: 00AAF6EF
                        • _wcscmp.LIBCMT ref: 00AAF70A
                        • FindNextFileW.KERNEL32(?,?), ref: 00AAF7A8
                        • FindClose.KERNEL32(00000000), ref: 00AAF7BE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                        • String ID: *.*
                        • API String ID: 713712311-438819550
                        • Opcode ID: 23ebfa3ffbe7ed56df2b21a705a8463b56969c7327b9b091250f1e15a11a618e
                        • Instruction ID: f37617b773c766f48aced5654677e5db7b101c0076fd344b5c005a526d2a32df
                        • Opcode Fuzzy Hash: 23ebfa3ffbe7ed56df2b21a705a8463b56969c7327b9b091250f1e15a11a618e
                        • Instruction Fuzzy Hash: 15419E7590021AAFCF15DFA4CC89EEEBBB4FF06310F14456AE815A31A0EB319E44CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-1546025612
                        • Opcode ID: ef1b2e360de5db5745769a6c0a455504ca09d868fa09390c3c483d2630469c9c
                        • Instruction ID: c2d89927e5bbc9b289e0ca01542ae3c29e80e43eb32da7c6c13d6aa3a5182c6a
                        • Opcode Fuzzy Hash: ef1b2e360de5db5745769a6c0a455504ca09d868fa09390c3c483d2630469c9c
                        • Instruction Fuzzy Hash: 1FA27F70E0421ACBDF24DF58C9807ADB7B1BB58319F2481A9DC5AA7680E7349EC9DF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: f599014433dfc1721be811a61d0f1c4ab81153bf9313e3bf3333df8e866bfbcd
                        • Instruction ID: ffe6407d2b4d003be69c023fd70852a2b5178c9306ba9bd0cd2850f075290fda
                        • Opcode Fuzzy Hash: f599014433dfc1721be811a61d0f1c4ab81153bf9313e3bf3333df8e866bfbcd
                        • Instruction Fuzzy Hash: 55129870E00609EFDF04DFA9DA95AAEB7F5FF48340F204269E806A7251EB35AD15CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A98CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A98D0D
                          • Part of subcall function 00A98CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A98D3A
                          • Part of subcall function 00A98CC3: GetLastError.KERNEL32 ref: 00A98D47
                        • ExitWindowsEx.USER32(?,00000000), ref: 00AA549B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $@$SeShutdownPrivilege
                        • API String ID: 2234035333-194228
                        • Opcode ID: 6cb44922f2c6aab197571f11ed442cefcc2929f4ebbedfe64de0de2a89fad156
                        • Instruction ID: be3a00e30c93b3eaea07bc63a911910dbea2a2030de1349e31326f4b6b229a5c
                        • Opcode Fuzzy Hash: 6cb44922f2c6aab197571f11ed442cefcc2929f4ebbedfe64de0de2a89fad156
                        • Instruction Fuzzy Hash: D5014732F54A052FEB2893B4EC4AFBA726AEB0B352F200525FD06D30C2DB544C8081A8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00AB65EF
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB65FE
                        • bind.WSOCK32(00000000,?,00000010), ref: 00AB661A
                        • listen.WSOCK32(00000000,00000005), ref: 00AB6629
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB6643
                        • closesocket.WSOCK32(00000000,00000000), ref: 00AB6657
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorLast$bindclosesocketlistensocket
                        • String ID:
                        • API String ID: 1279440585-0
                        • Opcode ID: b81ca5eb59177f6d0fc97c0e47ce4e874ba8978ffd57e14ddae186eabbf59a36
                        • Instruction ID: e0fdf1f58d053e708d1326402bc563c3de16e9ac5d42b48f30215f371871f8a1
                        • Opcode Fuzzy Hash: b81ca5eb59177f6d0fc97c0e47ce4e874ba8978ffd57e14ddae186eabbf59a36
                        • Instruction Fuzzy Hash: EE219C342002049FCB14EF64C995FAEB7BAEF88320F158169E956A73D2CB74AD02CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00A419FA
                        • GetSysColor.USER32(0000000F), ref: 00A41A4E
                        • SetBkColor.GDI32(?,00000000), ref: 00A41A61
                          • Part of subcall function 00A41290: DefDlgProcW.USER32(?,00000020,?), ref: 00A412D8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ColorProc$LongWindow
                        • String ID:
                        • API String ID: 3744519093-0
                        • Opcode ID: 63345f1f5be76dcb2e4161bcf8258897f5117940b0ba908a31c237ad222f5be4
                        • Instruction ID: f803e64bf4aadc05be8ecad533483215b63b79a5ff0e230947abdd0f2bd5835b
                        • Opcode Fuzzy Hash: 63345f1f5be76dcb2e4161bcf8258897f5117940b0ba908a31c237ad222f5be4
                        • Instruction Fuzzy Hash: 1AA17AB9111544BEE628AF288D48FBF3AADDFC53D5F15C12AF406D6192CF24CD8192B2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00AB80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00AB80CB
                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00AB6AB1
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB6ADA
                        • bind.WSOCK32(00000000,?,00000010), ref: 00AB6B13
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB6B20
                        • closesocket.WSOCK32(00000000,00000000), ref: 00AB6B34
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 99427753-0
                        • Opcode ID: 6c7fc30682cab0cba5b6a0efe42e2529dbb08c49897e4442f619d594e7e920ab
                        • Instruction ID: 797b6f1df30326a31cb7d9b9d2de4b0ef173dfd2da9442d67bf2d7361f6cf193
                        • Opcode Fuzzy Hash: 6c7fc30682cab0cba5b6a0efe42e2529dbb08c49897e4442f619d594e7e920ab
                        • Instruction Fuzzy Hash: 6C419079700210AFEB10BF64DD86F6F77A9DB88750F048058F91AAB3D3DA749D018791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: cdf46f4125b2d5a6f3d896001ca01864ae429f868070a770526d2a0553b9ddda
                        • Instruction ID: b3f6254cbb14747ef6df4465af83d0fd5fcbbcdf38724901a594c9b1d906f7c9
                        • Opcode Fuzzy Hash: cdf46f4125b2d5a6f3d896001ca01864ae429f868070a770526d2a0553b9ddda
                        • Instruction Fuzzy Hash: 9A11C431B009106FEB215F76DC44F2FBB99EF84761B8A443DF846D7241CB70E9428AA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00A81D88,?), ref: 00ABC312
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00ABC324
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                        • API String ID: 2574300362-1816364905
                        • Opcode ID: f6de36cd878da8c9f54dbe2eb0d1658695925420753c7b4893937e7272557e88
                        • Instruction ID: 2f18793d38b586701301fdbac935367755e7ffe941e3205c67861c422156b051
                        • Opcode Fuzzy Hash: f6de36cd878da8c9f54dbe2eb0d1658695925420753c7b4893937e7272557e88
                        • Instruction Fuzzy Hash: 37E01274610713DFDB208F65D804F96B6E8FF08765BC5C839E996DA261E770D841CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __itow__swprintf
                        • String ID:
                        • API String ID: 674341424-0
                        • Opcode ID: d80af31ea8b2d903c46d5f0da2f888bd18e33319ee9d6d73df9b5699b75ca538
                        • Instruction ID: ab5147d6063740ec6a42fd871d7321934a12d3ec984f74f23e5fd3e800160693
                        • Opcode Fuzzy Hash: d80af31ea8b2d903c46d5f0da2f888bd18e33319ee9d6d73df9b5699b75ca538
                        • Instruction Fuzzy Hash: 6A2258726083019FCB24EF24C991B6FB7E5BF84754F14491DF89697291EB70EA08CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00ABF151
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00ABF15F
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                        • Process32NextW.KERNEL32(00000000,?), ref: 00ABF21F
                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00ABF22E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                        • String ID:
                        • API String ID: 2576544623-0
                        • Opcode ID: 0f93db1307e102cc898641c5c72fec205b59834a31fe0cc43ed9ded0ff62f60b
                        • Instruction ID: 78e20e84e0a299b9f6038f7d5295cdb499b81b1f331a6bb64b476d96f6eaf19d
                        • Opcode Fuzzy Hash: 0f93db1307e102cc898641c5c72fec205b59834a31fe0cc43ed9ded0ff62f60b
                        • Instruction Fuzzy Hash: B2517D75504300AFD310EF24DC85EABB7E8EF98750F14492DF59597252EB70D905CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AA40D1
                        • _memset.LIBCMT ref: 00AA40F2
                        • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00AA4144
                        • CloseHandle.KERNEL32(00000000), ref: 00AA414D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CloseControlCreateDeviceFileHandle_memset
                        • String ID:
                        • API String ID: 1157408455-0
                        • Opcode ID: 30ef5b6b88dea0bc5412bf4bec0f8ed7dc8793c01ed70ab385b0989c26f164b3
                        • Instruction ID: 8798e4a1ff85c2ece05f370b2e31288c19fcac657a1908030d44c3a4818e5144
                        • Opcode Fuzzy Hash: 30ef5b6b88dea0bc5412bf4bec0f8ed7dc8793c01ed70ab385b0989c26f164b3
                        • Instruction Fuzzy Hash: 6D11EB759012287AD7309BA5AC4DFABBB7CEF85760F104296F908D7180D6744E808BA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A9EB19
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($|
                        • API String ID: 1659193697-1631851259
                        • Opcode ID: d5e5fba89be61d9e025534300cc33e16df9f292daf15d20c010d84862068afef
                        • Instruction ID: 5b4a7eecd9dfecb11ab7d90ea8b70bd0c027ef7c4b185a2f43193474ff42dafd
                        • Opcode Fuzzy Hash: d5e5fba89be61d9e025534300cc33e16df9f292daf15d20c010d84862068afef
                        • Instruction Fuzzy Hash: 8E322775A007059FDB28DF19C481A6AB7F1FF48320B15C56EE49ADB3A2E770E981CB40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00AB26D5
                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00AB270C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Internet$AvailableDataFileQueryRead
                        • String ID:
                        • API String ID: 599397726-0
                        • Opcode ID: 63b0eb41a07b62ef9afbe164647ba8c36e74c4142776becf675f46edf8e5ff4f
                        • Instruction ID: 94bef2dd4e4fdb20a28085c7e92929e1abe70571e538dfec5fb375ab94944e18
                        • Opcode Fuzzy Hash: 63b0eb41a07b62ef9afbe164647ba8c36e74c4142776becf675f46edf8e5ff4f
                        • Instruction Fuzzy Hash: 4E41D371900209BFEB20DF94DD95FFBB7BCEB40724F10406BF605A6142EA759E819764
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00AAB5AE
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00AAB608
                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00AAB655
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: f34ec2fe58ace7d66aea5600e892396f92845d9fc3f4d9f6b8b79ee9aaeb866c
                        • Instruction ID: 9113840fda78f41669bc3073b5457a14b7b86fe74155218adcb45fd24554047d
                        • Opcode Fuzzy Hash: f34ec2fe58ace7d66aea5600e892396f92845d9fc3f4d9f6b8b79ee9aaeb866c
                        • Instruction Fuzzy Hash: 70217135A10118EFCB00EFA5D984EEEFBB8FF89310F1580A9E905AB351DB319916CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A60FF6: std::exception::exception.LIBCMT ref: 00A6102C
                          • Part of subcall function 00A60FF6: __CxxThrowException@8.LIBCMT ref: 00A61041
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A98D0D
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A98D3A
                        • GetLastError.KERNEL32 ref: 00A98D47
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                        • String ID:
                        • API String ID: 1922334811-0
                        • Opcode ID: 4a8dcf024ffe12d398d155be71c79de668232b7df01d666fd3d5510ca013f827
                        • Instruction ID: 7fe5d0062473d31089bde489fb45d37c0face0f35f1da6526883ac12e26cf26f
                        • Opcode Fuzzy Hash: 4a8dcf024ffe12d398d155be71c79de668232b7df01d666fd3d5510ca013f827
                        • Instruction Fuzzy Hash: 4211C1B2514208AFDB28DF68DC85D6BBBFDFB04710B20852EF85683241EF30AC418A60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00AA4C2C
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00AA4C43
                        • FreeSid.ADVAPI32(?), ref: 00AA4C53
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: 21b56f81b8423c2ed5f3bfe706c25378aa4f7cebf09cf905a27df834c47d99e2
                        • Instruction ID: 3f0c78bad7ef5c52a4b9585793d922539a52d8dcac0ce4b19f352ab5748c8515
                        • Opcode Fuzzy Hash: 21b56f81b8423c2ed5f3bfe706c25378aa4f7cebf09cf905a27df834c47d99e2
                        • Instruction Fuzzy Hash: F5F04975A5130CBFDF04DFF0DC89EAEBBBDEF08611F0044A9A901E2181E7706A048B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a66a873c44115738ed6d2b35f6becefb69951818a400c8e6ef4ef3e79fbad38f
                        • Instruction ID: 5d8455c688559f0c8a86702a495247411c141d2f202166f0dfd0772ea013703f
                        • Opcode Fuzzy Hash: a66a873c44115738ed6d2b35f6becefb69951818a400c8e6ef4ef3e79fbad38f
                        • Instruction Fuzzy Hash: 6A22AD79A00216CFDF24DF58C580AAEBBF0FF98300F148569E856AB341E775AD85CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00AAC966
                        • FindClose.KERNEL32(00000000), ref: 00AAC996
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: f8e9dd63c321ec096dd3e95903ec506139f52fc449cccaca98126d56444a6100
                        • Instruction ID: 24fcbb6ef0de8f7c6a3c4416f7b0dcafb3fccf5f85337fb1aa72fd549223c751
                        • Opcode Fuzzy Hash: f8e9dd63c321ec096dd3e95903ec506139f52fc449cccaca98126d56444a6100
                        • Instruction Fuzzy Hash: 7B1152756106009FDB10DF29D84592BF7E5EF85324F01851EF8A5D73A1DB34AC11CB81
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00AB977D,?,00ACFB84,?), ref: 00AAA302
                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00AB977D,?,00ACFB84,?), ref: 00AAA314
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: cb1c812a97ab34890423ccbb4c4d308ef5946ea673221941e94d9aa4d7067702
                        • Instruction ID: 31061f98d096a9e3ba1541f7fd44cbbe3b7f5d67e0bdb538c8921707841ec14c
                        • Opcode Fuzzy Hash: cb1c812a97ab34890423ccbb4c4d308ef5946ea673221941e94d9aa4d7067702
                        • Instruction Fuzzy Hash: D2F0823564422DBBDB109FA4CC48FEA77ADBF09761F008165B918D7181DB309944CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A98851), ref: 00A98728
                        • CloseHandle.KERNEL32(?,?,00A98851), ref: 00A9873A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: 1e684b9c433bed0dafddd28444090f08aeddab366dc9b21d5052d2b638ef84b8
                        • Instruction ID: 95c7389003724df376c781c6bab1c402773c99af20537f87fd71181290718425
                        • Opcode Fuzzy Hash: 1e684b9c433bed0dafddd28444090f08aeddab366dc9b21d5052d2b638ef84b8
                        • Instruction Fuzzy Hash: 49E0B676010650EEEF252BA4ED09D777BEAEB04750725883AB89680470DB62AC91DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00A68F97,?,?,?,00000001), ref: 00A6A39A
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00A6A3A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 3f87e6c769d82440616ce3015f45a999bd889dead0fe6d2e99b464c1429cd384
                        • Instruction ID: b575883745350ac7a1c8c00f9d28a733e591dabd330bf124529558c62156e2e6
                        • Opcode Fuzzy Hash: 3f87e6c769d82440616ce3015f45a999bd889dead0fe6d2e99b464c1429cd384
                        • Instruction Fuzzy Hash: D2B09231054248BFCA006BD1EC09F883F6AEB84AA2F414020FA1D88260CB6256528A91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bec9dfbe8da665c7312242fff476238aa3f414bb6075e0f8361559ed3da3c3fd
                        • Instruction ID: 6f0d3f03e5c8eae16dadc698440de1c08136202d32452a336bf8792c584d7ff3
                        • Opcode Fuzzy Hash: bec9dfbe8da665c7312242fff476238aa3f414bb6075e0f8361559ed3da3c3fd
                        • Instruction Fuzzy Hash: 72320422D6AF014DD7279634E832339A369EFB73C4F55D737E81AB59A6EB28C4834100
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 536f720e4002f8c39616cab707ecdcab2b582a598dc3a5e30ad7364b72e14e34
                        • Instruction ID: a54ef8f8f9eb7d031a5c87b5290a0aaf0b23ab51c7e1507e771784c62ac7183a
                        • Opcode Fuzzy Hash: 536f720e4002f8c39616cab707ecdcab2b582a598dc3a5e30ad7364b72e14e34
                        • Instruction Fuzzy Hash: A7B1DD20E2AF414DD62396798831336BB5CAFBB6D5B52D71BFC2B74D22EB2185834241
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __time64.LIBCMT ref: 00AA8B25
                          • Part of subcall function 00A6543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00AA91F8,00000000,?,?,?,?,00AA93A9,00000000,?), ref: 00A65443
                          • Part of subcall function 00A6543A: __aulldiv.LIBCMT ref: 00A65463
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Time$FileSystem__aulldiv__time64
                        • String ID:
                        • API String ID: 2893107130-0
                        • Opcode ID: 900fbdbc326b34c573167329949fdd5dee5e2fe252ff3f10b9868d5a253a47ac
                        • Instruction ID: 55c81db1ac44a0f882d1ac84487caeed334f9c3f15f632684ee2c0808d1e03fb
                        • Opcode Fuzzy Hash: 900fbdbc326b34c573167329949fdd5dee5e2fe252ff3f10b9868d5a253a47ac
                        • Instruction Fuzzy Hash: F32172726355108BC729CF25D841A52B7E1EBB5311B288E6CD1E5CB2D0CE74BD45CB94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • BlockInput.USER32(00000001), ref: 00AB4218
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: d14376560d812570ee0deed48b206934bf8f8cc2ed3d4cabf17d1fe7bb1d0d34
                        • Instruction ID: 136e9df4478de01bfa72034db11bbc7e12b0cf7b78ed0094a037a0221fba3cc2
                        • Opcode Fuzzy Hash: d14376560d812570ee0deed48b206934bf8f8cc2ed3d4cabf17d1fe7bb1d0d34
                        • Instruction Fuzzy Hash: BEE01A752402149FC710EF59D944A9BB7ECAF987A0F018026F849CB352DA70A8419BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00AA4F18
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: mouse_event
                        • String ID:
                        • API String ID: 2434400541-0
                        • Opcode ID: 0afed0c0037a971afe2dd202033b12859f10f8a74ed677544f5d13043d8135a3
                        • Instruction ID: 39c54147f705f88674726219d29ca200216b22245c0f15e2c14bc3beb6b9d561
                        • Opcode Fuzzy Hash: 0afed0c0037a971afe2dd202033b12859f10f8a74ed677544f5d13043d8135a3
                        • Instruction Fuzzy Hash: BAD05EB01A42093CFC684B24AC0FF7E0509E3CAF81F8469893301874C1EBE56C01A034
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00A988D1), ref: 00A98CB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: LogonUser
                        • String ID:
                        • API String ID: 1244722697-0
                        • Opcode ID: 04f0bc2a5afcaaa5b371c16644020df1272f81f7e67cd29d8ed1f198c91d027a
                        • Instruction ID: 42870116de2e7a8a21e5bc990a70926c5855afe0bebeaf40733228016b959350
                        • Opcode Fuzzy Hash: 04f0bc2a5afcaaa5b371c16644020df1272f81f7e67cd29d8ed1f198c91d027a
                        • Instruction Fuzzy Hash: A6D05E3226050EAFEF018EA4DC01EAE3B6AEB04B01F408111FE15C50A1C775D835AB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00A82242
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: 288ac9c57635b8d1cc346b2478c62f230464c7e53400b8186d29001c6239853e
                        • Instruction ID: 1fed97863682f117a6c1035713c319e052f166ce5b7c1b01b3208257a1c73a38
                        • Opcode Fuzzy Hash: 288ac9c57635b8d1cc346b2478c62f230464c7e53400b8186d29001c6239853e
                        • Instruction Fuzzy Hash: 4BC048F1801109DBDB05EBA0DA88DEEB7BDAB08305F2140A6A102F2100E7749B458B71
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00A6A36A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: cbf299ac551e9d134a683ca6a1ffcc3324e2cad59c05d9265c2533515c928869
                        • Instruction ID: e587c9961824bf4830c36c8a057778f7d24f5f5f19d228dbb1c8bae18b8ed3df
                        • Opcode Fuzzy Hash: cbf299ac551e9d134a683ca6a1ffcc3324e2cad59c05d9265c2533515c928869
                        • Instruction Fuzzy Hash: 68A0123000010CBB8A001B81EC048447F5DD6401907004020F40C44121C73255114580
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3c4437038b6c3e60ac42874d512603ba9ad0df299ec7fb03b6550b869e8f07d2
                        • Instruction ID: 364cd12c75d198a20f627bcb9cbe8f048076c6558bc4aca01ab0393512eddb87
                        • Opcode Fuzzy Hash: 3c4437038b6c3e60ac42874d512603ba9ad0df299ec7fb03b6550b869e8f07d2
                        • Instruction Fuzzy Hash: 26223730A01616CBDF29CB68C49567D77F1FF41342F29846ADC52AB292DB3C9D89CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction ID: 1977b8e6d186aa3bcc5141c1ef8e783793d1f63a485bccf66bd37a2c1d7de1bc
                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction Fuzzy Hash: 59C17E362055930ADB2D8739D43423EBEF15BA27B131A076EE8B3CB5C4EF20D525A720
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction ID: a952263f17049d59cb47182815026dfd9e3bcb1d15a7871d47d2371020106fd1
                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction Fuzzy Hash: 0EC16E322055930ADB2D473A943423FBEF15BA27B131A076EE8B2DB5D5EF20D525A720
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                        • Instruction ID: c897b51ef2b13875b95f5321f907ea8d06b7f7fed3aac64af5da38cba1f32b3a
                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                        • Instruction Fuzzy Hash: 59C15F3220919349DB6D473A943413FBEF19BA27B131E0B6EE4B2CB5D4EF20D525E620
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?,00ACF910), ref: 00AC38AF
                        • IsWindowVisible.USER32(?), ref: 00AC38D3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharUpperVisibleWindow
                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                        • API String ID: 4105515805-45149045
                        • Opcode ID: cd143909b6a0365ca58f671254c7c232cb8269c2d5c7beee667c6ebcf310db21
                        • Instruction ID: bd019448864caf79b338c521ee77a505c75093fc59825a467adede00e9bcba7d
                        • Opcode Fuzzy Hash: cd143909b6a0365ca58f671254c7c232cb8269c2d5c7beee667c6ebcf310db21
                        • Instruction Fuzzy Hash: E3D15935204205DFCF14EF50C651E6EB7B5AF94384F11855CB9865B2A2CB31EE4ACB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 00ACA89F
                        • GetSysColorBrush.USER32(0000000F), ref: 00ACA8D0
                        • GetSysColor.USER32(0000000F), ref: 00ACA8DC
                        • SetBkColor.GDI32(?,000000FF), ref: 00ACA8F6
                        • SelectObject.GDI32(?,?), ref: 00ACA905
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00ACA930
                        • GetSysColor.USER32(00000010), ref: 00ACA938
                        • CreateSolidBrush.GDI32(00000000), ref: 00ACA93F
                        • FrameRect.USER32(?,?,00000000), ref: 00ACA94E
                        • DeleteObject.GDI32(00000000), ref: 00ACA955
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00ACA9A0
                        • FillRect.USER32(?,?,?), ref: 00ACA9D2
                        • GetWindowLongW.USER32(?,000000F0), ref: 00ACA9FD
                          • Part of subcall function 00ACAB60: GetSysColor.USER32(00000012), ref: 00ACAB99
                          • Part of subcall function 00ACAB60: SetTextColor.GDI32(?,?), ref: 00ACAB9D
                          • Part of subcall function 00ACAB60: GetSysColorBrush.USER32(0000000F), ref: 00ACABB3
                          • Part of subcall function 00ACAB60: GetSysColor.USER32(0000000F), ref: 00ACABBE
                          • Part of subcall function 00ACAB60: GetSysColor.USER32(00000011), ref: 00ACABDB
                          • Part of subcall function 00ACAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00ACABE9
                          • Part of subcall function 00ACAB60: SelectObject.GDI32(?,00000000), ref: 00ACABFA
                          • Part of subcall function 00ACAB60: SetBkColor.GDI32(?,00000000), ref: 00ACAC03
                          • Part of subcall function 00ACAB60: SelectObject.GDI32(?,?), ref: 00ACAC10
                          • Part of subcall function 00ACAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00ACAC2F
                          • Part of subcall function 00ACAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00ACAC46
                          • Part of subcall function 00ACAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00ACAC5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                        • String ID:
                        • API String ID: 4124339563-0
                        • Opcode ID: 346bab97636f6738de54f70f7c3ca6a4e01c7a40ad8955c010f188d92cf48032
                        • Instruction ID: 86adbf7516730f52fecd178fab5bbede45b07c270099857a112f26e73df9d8ec
                        • Opcode Fuzzy Hash: 346bab97636f6738de54f70f7c3ca6a4e01c7a40ad8955c010f188d92cf48032
                        • Instruction Fuzzy Hash: DCA18072008305AFD710DFA4DC08E6B7BAAFF88325F164B2DFA62961A0D731D945CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DestroyWindow.USER32(?,?,?), ref: 00A42CA2
                        • DeleteObject.GDI32(00000000), ref: 00A42CE8
                        • DeleteObject.GDI32(00000000), ref: 00A42CF3
                        • DestroyIcon.USER32(00000000,?,?,?), ref: 00A42CFE
                        • DestroyWindow.USER32(00000000,?,?,?), ref: 00A42D09
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A7C68B
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A7C6C4
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A7CAED
                          • Part of subcall function 00A41B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A42036,?,00000000,?,?,?,?,00A416CB,00000000,?), ref: 00A41B9A
                        • SendMessageW.USER32(?,00001053), ref: 00A7CB2A
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A7CB41
                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A7CB57
                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A7CB62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 464785882-4108050209
                        • Opcode ID: 25286641cb88200d746c2d71f73db65b09b9f9a43255dd3921ef3fd60619978a
                        • Instruction ID: e34e7fe771e904ba19d2008fe9da697e2ada7eea169a56c46d6ff5c137d3301e
                        • Opcode Fuzzy Hash: 25286641cb88200d746c2d71f73db65b09b9f9a43255dd3921ef3fd60619978a
                        • Instruction Fuzzy Hash: 3F127B34604201EFDB24CF24C984BA9BBE5BF85321F54C56DF999DB262CB71E842CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DestroyWindow.USER32(00000000), ref: 00AB77F1
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00AB78B0
                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00AB78EE
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00AB7900
                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00AB7946
                        • GetClientRect.USER32(00000000,?), ref: 00AB7952
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00AB7996
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00AB79A5
                        • GetStockObject.GDI32(00000011), ref: 00AB79B5
                        • SelectObject.GDI32(00000000,00000000), ref: 00AB79B9
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00AB79C9
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00AB79D2
                        • DeleteDC.GDI32(00000000), ref: 00AB79DB
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00AB7A07
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00AB7A1E
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00AB7A59
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00AB7A6D
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00AB7A7E
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00AB7AAE
                        • GetStockObject.GDI32(00000011), ref: 00AB7AB9
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00AB7AC4
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00AB7ACE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: f8088a7c82efc088f888776b917168f5b01ad5f0bbed6f345caf85589a5d52a6
                        • Instruction ID: 2d725329f78f68a28da7adb312babda265af6edcb9b65bc6461e10e34cec347b
                        • Opcode Fuzzy Hash: f8088a7c82efc088f888776b917168f5b01ad5f0bbed6f345caf85589a5d52a6
                        • Instruction Fuzzy Hash: 6AA16471A40219BFEB14DBA4DD4AFAF7BB9EB48710F014114FA15A72E1DBB0AD11CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00AAAF89
                        • GetDriveTypeW.KERNEL32(?,00ACFAC0,?,\\.\,00ACF910), ref: 00AAB066
                        • SetErrorMode.KERNEL32(00000000,00ACFAC0,?,\\.\,00ACF910), ref: 00AAB1C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: e0c875c99ba7c3da654383525c95f8bc8abfadeffb027ec7d4bd807eb7773db5
                        • Instruction ID: 8201fb6b02a3b45a74e4ad98bdb355a2f5403c5ad473e4489ee9d4fae3cc4d50
                        • Opcode Fuzzy Hash: e0c875c99ba7c3da654383525c95f8bc8abfadeffb027ec7d4bd807eb7773db5
                        • Instruction Fuzzy Hash: 5151C274690309EF8B04EB90CA92CBDB7B1FB663417204615F50AE72D2C736AD41DB62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 1038674560-86951937
                        • Opcode ID: 55d70733e3992cc310ceeb3130e15bcc077caf83dbeec79c27898fa9be50cb7f
                        • Instruction ID: 2760fb98680a517b3ef76906387a43548c0ee5b8a410af62ac3decd9d221acb3
                        • Opcode Fuzzy Hash: 55d70733e3992cc310ceeb3130e15bcc077caf83dbeec79c27898fa9be50cb7f
                        • Instruction Fuzzy Hash: 08812A75640245BFCF24EB60CE82FAE7778FF66740F048125F945AB182EB61DA42D292
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetSysColor.USER32(00000012), ref: 00ACAB99
                        • SetTextColor.GDI32(?,?), ref: 00ACAB9D
                        • GetSysColorBrush.USER32(0000000F), ref: 00ACABB3
                        • GetSysColor.USER32(0000000F), ref: 00ACABBE
                        • CreateSolidBrush.GDI32(?), ref: 00ACABC3
                        • GetSysColor.USER32(00000011), ref: 00ACABDB
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00ACABE9
                        • SelectObject.GDI32(?,00000000), ref: 00ACABFA
                        • SetBkColor.GDI32(?,00000000), ref: 00ACAC03
                        • SelectObject.GDI32(?,?), ref: 00ACAC10
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00ACAC2F
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00ACAC46
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00ACAC5B
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00ACACA7
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00ACACCE
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00ACACEC
                        • DrawFocusRect.USER32(?,?), ref: 00ACACF7
                        • GetSysColor.USER32(00000011), ref: 00ACAD05
                        • SetTextColor.GDI32(?,00000000), ref: 00ACAD0D
                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00ACAD21
                        • SelectObject.GDI32(?,00ACA869), ref: 00ACAD38
                        • DeleteObject.GDI32(?), ref: 00ACAD43
                        • SelectObject.GDI32(?,?), ref: 00ACAD49
                        • DeleteObject.GDI32(?), ref: 00ACAD4E
                        • SetTextColor.GDI32(?,?), ref: 00ACAD54
                        • SetBkColor.GDI32(?,?), ref: 00ACAD5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: 87eec1ecf60190e1fa0c9619418c163dc579fc8881ff916ebee0d1c0b18b742a
                        • Instruction ID: 8978ba12a5513946383d63793cb9f86838239d42423888d4077406b8c2dabd20
                        • Opcode Fuzzy Hash: 87eec1ecf60190e1fa0c9619418c163dc579fc8881ff916ebee0d1c0b18b742a
                        • Instruction Fuzzy Hash: 2E615171900218EFDF11DFE4DC48EAE7B7AEB08324F164225FA15AB2A1D7719D41DB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00AC8D34
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00AC8D45
                        • CharNextW.USER32(0000014E), ref: 00AC8D74
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00AC8DB5
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00AC8DCB
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00AC8DDC
                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00AC8DF9
                        • SetWindowTextW.USER32(?,0000014E), ref: 00AC8E45
                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00AC8E5B
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00AC8E8C
                        • _memset.LIBCMT ref: 00AC8EB1
                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00AC8EFA
                        • _memset.LIBCMT ref: 00AC8F59
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00AC8F83
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00AC8FDB
                        • SendMessageW.USER32(?,0000133D,?,?), ref: 00AC9088
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00AC90AA
                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00AC90F4
                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00AC9121
                        • DrawMenuBar.USER32(?), ref: 00AC9130
                        • SetWindowTextW.USER32(?,0000014E), ref: 00AC9158
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                        • String ID: 0
                        • API String ID: 1073566785-4108050209
                        • Opcode ID: a21268020c29cc7583abe7c7d86774768a67d23f98ef3604b874e64e16b02f7e
                        • Instruction ID: 4423dff12730ac2683852ce3193fd187b8ed7c1adf07be05e9aac202b413ce51
                        • Opcode Fuzzy Hash: a21268020c29cc7583abe7c7d86774768a67d23f98ef3604b874e64e16b02f7e
                        • Instruction Fuzzy Hash: F1E16B70900219AEDF21DFA4CC89FEE7BB9FF05710F158159F916AA290DB748A81DF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCursorPos.USER32(?), ref: 00AC4C51
                        • GetDesktopWindow.USER32 ref: 00AC4C66
                        • GetWindowRect.USER32(00000000), ref: 00AC4C6D
                        • GetWindowLongW.USER32(?,000000F0), ref: 00AC4CCF
                        • DestroyWindow.USER32(?), ref: 00AC4CFB
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00AC4D24
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00AC4D42
                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00AC4D68
                        • SendMessageW.USER32(?,00000421,?,?), ref: 00AC4D7D
                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00AC4D90
                        • IsWindowVisible.USER32(?), ref: 00AC4DB0
                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00AC4DCB
                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00AC4DDF
                        • GetWindowRect.USER32(?,?), ref: 00AC4DF7
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00AC4E1D
                        • GetMonitorInfoW.USER32(00000000,?), ref: 00AC4E37
                        • CopyRect.USER32(?,?), ref: 00AC4E4E
                        • SendMessageW.USER32(?,00000412,00000000), ref: 00AC4EB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: 94fdb4a30878cf2227823a6af4dee0603950a7212d872c4ad67fc9e072bd6b5b
                        • Instruction ID: f0629f3fed44037bd2b3f18801c7e677395bd7eed805eba950086a5e1d3e204b
                        • Opcode Fuzzy Hash: 94fdb4a30878cf2227823a6af4dee0603950a7212d872c4ad67fc9e072bd6b5b
                        • Instruction Fuzzy Hash: EAB14671608340AFDB04DF64C998F6BBBE5BB88314F01891CF599AB2A1DB71EC05CB95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00AA46E8
                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00AA470E
                        • _wcscpy.LIBCMT ref: 00AA473C
                        • _wcscmp.LIBCMT ref: 00AA4747
                        • _wcscat.LIBCMT ref: 00AA475D
                        • _wcsstr.LIBCMT ref: 00AA4768
                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00AA4784
                        • _wcscat.LIBCMT ref: 00AA47CD
                        • _wcscat.LIBCMT ref: 00AA47D4
                        • _wcsncpy.LIBCMT ref: 00AA47FF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                        • API String ID: 699586101-1459072770
                        • Opcode ID: 21ca1012f520246897d75376031718cac62c3ada1f27d1676f49648427a11b40
                        • Instruction ID: 25eac8069deca81a4cf65159f7d486d447d53fe9979e7cfc5d4c8bb784cc727d
                        • Opcode Fuzzy Hash: 21ca1012f520246897d75376031718cac62c3ada1f27d1676f49648427a11b40
                        • Instruction Fuzzy Hash: 75410672A00204BBDB11A7749D43FBF77BCEF8A710F04056AF905E7182EB759A0197A5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A428BC
                        • GetSystemMetrics.USER32(00000007), ref: 00A428C4
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A428EF
                        • GetSystemMetrics.USER32(00000008), ref: 00A428F7
                        • GetSystemMetrics.USER32(00000004), ref: 00A4291C
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00A42939
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00A42949
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00A4297C
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00A42990
                        • GetClientRect.USER32(00000000,000000FF), ref: 00A429AE
                        • GetStockObject.GDI32(00000011), ref: 00A429CA
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A429D5
                          • Part of subcall function 00A42344: GetCursorPos.USER32(?), ref: 00A42357
                          • Part of subcall function 00A42344: ScreenToClient.USER32(00B067B0,?), ref: 00A42374
                          • Part of subcall function 00A42344: GetAsyncKeyState.USER32(00000001), ref: 00A42399
                          • Part of subcall function 00A42344: GetAsyncKeyState.USER32(00000002), ref: 00A423A7
                        • SetTimer.USER32(00000000,00000000,00000028,00A41256), ref: 00A429FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: fcbc15e7c0c8d0915439418ca812f56024ccc6bbcc97f9aa62fcd83a360aa376
                        • Instruction ID: ae095f07e5c214ec1b180a267df2a9efd908e60f65540f73e9645d4172618b18
                        • Opcode Fuzzy Hash: fcbc15e7c0c8d0915439418ca812f56024ccc6bbcc97f9aa62fcd83a360aa376
                        • Instruction Fuzzy Hash: 03B18E75A0020AEFDB14DFA8DC45FAE7BB5FB48314F118229FA15EB2A0DB749851CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00AC40F6
                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00AC41B6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharMessageSendUpper
                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                        • API String ID: 3974292440-719923060
                        • Opcode ID: 527bf313ef200f75114704f6fa8d88e232559d4889588c715ada0f3a76dc4461
                        • Instruction ID: 0b1ef9358a9c085583ccaab2c8930e6504d20de5b89448685ea88b829bca2849
                        • Opcode Fuzzy Hash: 527bf313ef200f75114704f6fa8d88e232559d4889588c715ada0f3a76dc4461
                        • Instruction Fuzzy Hash: 77A17C342142459FCB14EF60CA62F6BB3F5AF88314F15496CB9969B392DB30EC06CB55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadCursorW.USER32(00000000,00007F89), ref: 00AB5309
                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00AB5314
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00AB531F
                        • LoadCursorW.USER32(00000000,00007F03), ref: 00AB532A
                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00AB5335
                        • LoadCursorW.USER32(00000000,00007F01), ref: 00AB5340
                        • LoadCursorW.USER32(00000000,00007F81), ref: 00AB534B
                        • LoadCursorW.USER32(00000000,00007F88), ref: 00AB5356
                        • LoadCursorW.USER32(00000000,00007F80), ref: 00AB5361
                        • LoadCursorW.USER32(00000000,00007F86), ref: 00AB536C
                        • LoadCursorW.USER32(00000000,00007F83), ref: 00AB5377
                        • LoadCursorW.USER32(00000000,00007F85), ref: 00AB5382
                        • LoadCursorW.USER32(00000000,00007F82), ref: 00AB538D
                        • LoadCursorW.USER32(00000000,00007F84), ref: 00AB5398
                        • LoadCursorW.USER32(00000000,00007F04), ref: 00AB53A3
                        • LoadCursorW.USER32(00000000,00007F02), ref: 00AB53AE
                        • GetCursorInfo.USER32(?), ref: 00AB53BE
                        • GetLastError.KERNEL32(00000001,00000000), ref: 00AB53E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Cursor$Load$ErrorInfoLast
                        • String ID:
                        • API String ID: 3215588206-0
                        • Opcode ID: f574549df8236822c2fd767210526c5262da4fa768ba8d0e0df098d55e427ff7
                        • Instruction ID: 22ad17834909aade692bd95cc9031543d16b13863c8bdc25984de646202ef36d
                        • Opcode Fuzzy Hash: f574549df8236822c2fd767210526c5262da4fa768ba8d0e0df098d55e427ff7
                        • Instruction Fuzzy Hash: 73415170E043196ADB109FBA8C49DAFFFFDEF51B50B10452FE509E7291DAB8A4018E61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 00A9AAA5
                        • __swprintf.LIBCMT ref: 00A9AB46
                        • _wcscmp.LIBCMT ref: 00A9AB59
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A9ABAE
                        • _wcscmp.LIBCMT ref: 00A9ABEA
                        • GetClassNameW.USER32(?,?,00000400), ref: 00A9AC21
                        • GetDlgCtrlID.USER32(?), ref: 00A9AC73
                        • GetWindowRect.USER32(?,?), ref: 00A9ACA9
                        • GetParent.USER32(?), ref: 00A9ACC7
                        • ScreenToClient.USER32(00000000), ref: 00A9ACCE
                        • GetClassNameW.USER32(?,?,00000100), ref: 00A9AD48
                        • _wcscmp.LIBCMT ref: 00A9AD5C
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00A9AD82
                        • _wcscmp.LIBCMT ref: 00A9AD96
                          • Part of subcall function 00A6386C: _iswctype.LIBCMT ref: 00A63874
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                        • String ID: %s%u
                        • API String ID: 3744389584-679674701
                        • Opcode ID: 0f9e749fb9a43a2cfe1769155b92871f269a9a63aeee3268564c5367e2618436
                        • Instruction ID: ea6b26cd3e2846a4827ec28e96d79c1f91ad0a9798471cb65334a86a0fc74ddc
                        • Opcode Fuzzy Hash: 0f9e749fb9a43a2cfe1769155b92871f269a9a63aeee3268564c5367e2618436
                        • Instruction Fuzzy Hash: 57A1BD71304606AFDB14DF64C984FAAB7E8FF24355F10862AF999C2590DB30E946CBD2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetClassNameW.USER32(00000008,?,00000400), ref: 00A9B3DB
                        • _wcscmp.LIBCMT ref: 00A9B3EC
                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 00A9B414
                        • CharUpperBuffW.USER32(?,00000000), ref: 00A9B431
                        • _wcscmp.LIBCMT ref: 00A9B44F
                        • _wcsstr.LIBCMT ref: 00A9B460
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00A9B498
                        • _wcscmp.LIBCMT ref: 00A9B4A8
                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 00A9B4CF
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00A9B518
                        • _wcscmp.LIBCMT ref: 00A9B528
                        • GetClassNameW.USER32(00000010,?,00000400), ref: 00A9B550
                        • GetWindowRect.USER32(00000004,?), ref: 00A9B5B9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                        • String ID: @$ThumbnailClass
                        • API String ID: 1788623398-1539354611
                        • Opcode ID: 4a20a5a516689c82fa215c401740329942cbc166be173f17a3651deec83db4bb
                        • Instruction ID: fa53f535c7aeb84f5ca2c8813d3b2e7139de9e6177958ea8d3d9544548fec9e0
                        • Opcode Fuzzy Hash: 4a20a5a516689c82fa215c401740329942cbc166be173f17a3651deec83db4bb
                        • Instruction Fuzzy Hash: 598180722143459FDF04DF10EA85FAA7BE8EF84314F048569FD859A092DB34ED46CB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                        • API String ID: 1038674560-1810252412
                        • Opcode ID: 96aa17f1cf1edec6ab5d70abfe2266734d6a208613da27b403189b118b242751
                        • Instruction ID: 88de69c8f0b657289fcad24f13ce047e25a840a9e700a71d3a4dd31b65ac9163
                        • Opcode Fuzzy Hash: 96aa17f1cf1edec6ab5d70abfe2266734d6a208613da27b403189b118b242751
                        • Instruction Fuzzy Hash: 69318D35A14209A6DF14FBA0DF83FFE77B8AF20750F600525B551B20D2EF626E04C961
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadIconW.USER32(00000063), ref: 00A9C4D4
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A9C4E6
                        • SetWindowTextW.USER32(?,?), ref: 00A9C4FD
                        • GetDlgItem.USER32(?,000003EA), ref: 00A9C512
                        • SetWindowTextW.USER32(00000000,?), ref: 00A9C518
                        • GetDlgItem.USER32(?,000003E9), ref: 00A9C528
                        • SetWindowTextW.USER32(00000000,?), ref: 00A9C52E
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A9C54F
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A9C569
                        • GetWindowRect.USER32(?,?), ref: 00A9C572
                        • SetWindowTextW.USER32(?,?), ref: 00A9C5DD
                        • GetDesktopWindow.USER32 ref: 00A9C5E3
                        • GetWindowRect.USER32(00000000), ref: 00A9C5EA
                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00A9C636
                        • GetClientRect.USER32(?,?), ref: 00A9C643
                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00A9C668
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A9C693
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                        • String ID:
                        • API String ID: 3869813825-0
                        • Opcode ID: 023069a778bb28d52a8508596feb45e4391464070bc47569d64cde2f200e425f
                        • Instruction ID: 956a676c1fe09d0a2dc516985514771e3ff7b8e1da60268d0a73827c985a0ed3
                        • Opcode Fuzzy Hash: 023069a778bb28d52a8508596feb45e4391464070bc47569d64cde2f200e425f
                        • Instruction Fuzzy Hash: 30515071A00B09AFDF20DFA8DE89F6EBBF5FF04715F014528E686A25A0D774A905CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00ACA4C8
                        • DestroyWindow.USER32(?,?), ref: 00ACA542
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00ACA5BC
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00ACA5DE
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00ACA5F1
                        • DestroyWindow.USER32(00000000), ref: 00ACA613
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00A40000,00000000), ref: 00ACA64A
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00ACA663
                        • GetDesktopWindow.USER32 ref: 00ACA67C
                        • GetWindowRect.USER32(00000000), ref: 00ACA683
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00ACA69B
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00ACA6B3
                          • Part of subcall function 00A425DB: GetWindowLongW.USER32(?,000000EB), ref: 00A425EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                        • String ID: 0$tooltips_class32
                        • API String ID: 1297703922-3619404913
                        • Opcode ID: 2c6a584981bf05fbd1bffe3f2ba2f1f073a966b473147fe27d33f41e644cd161
                        • Instruction ID: 7c91f3e2a96406d2af006cd3dae0a7d6fe125e99a1b8b0dabb914afad55c4726
                        • Opcode Fuzzy Hash: 2c6a584981bf05fbd1bffe3f2ba2f1f073a966b473147fe27d33f41e644cd161
                        • Instruction Fuzzy Hash: 83719B75140249AFD720CF28DC49F7A7BE6FBA8308F09452DF985872A0DB70E906DB16
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • DragQueryPoint.SHELL32(?,?), ref: 00ACC917
                          • Part of subcall function 00ACADF1: ClientToScreen.USER32(?,?), ref: 00ACAE1A
                          • Part of subcall function 00ACADF1: GetWindowRect.USER32(?,?), ref: 00ACAE90
                          • Part of subcall function 00ACADF1: PtInRect.USER32(?,?,00ACC304), ref: 00ACAEA0
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00ACC980
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00ACC98B
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00ACC9AE
                        • _wcscat.LIBCMT ref: 00ACC9DE
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00ACC9F5
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00ACCA0E
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00ACCA25
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00ACCA47
                        • DragFinish.SHELL32(?), ref: 00ACCA4E
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00ACCB41
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                        • API String ID: 169749273-3440237614
                        • Opcode ID: 72726165937069eaf0ba6d15ef8531dd6b24f2f209aae034d14de823e0fc4323
                        • Instruction ID: ac01fd64a3c8b98e60da60d515f22b82874db812dc20146d466256de09d4356e
                        • Opcode Fuzzy Hash: 72726165937069eaf0ba6d15ef8531dd6b24f2f209aae034d14de823e0fc4323
                        • Instruction Fuzzy Hash: 49616971108301AFC701DFA4CD85EAFBBE9EFD8750F00092EF595962A1DB309A4ACB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00AC46AB
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00AC46F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharMessageSendUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 3974292440-4258414348
                        • Opcode ID: a91a028e0e7b64da3e3070df0f683455e5eb2a9128502a6c5ed1ef74558a1476
                        • Instruction ID: fbe07e49b356a30a980179104246bcd86772b567849f65e98939dc1cb2f38655
                        • Opcode Fuzzy Hash: a91a028e0e7b64da3e3070df0f683455e5eb2a9128502a6c5ed1ef74558a1476
                        • Instruction Fuzzy Hash: C9916C342043159FCB14EF20C561F6BB7E1AF98354F05886DB8965B3A2CB30ED5ACB85
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00ACBB6E
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00AC9431), ref: 00ACBBCA
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00ACBC03
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00ACBC46
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00ACBC7D
                        • FreeLibrary.KERNEL32(?), ref: 00ACBC89
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00ACBC99
                        • DestroyIcon.USER32(?,?,?,?,?,00AC9431), ref: 00ACBCA8
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00ACBCC5
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00ACBCD1
                          • Part of subcall function 00A6313D: __wcsicmp_l.LIBCMT ref: 00A631C6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                        • String ID: .dll$.exe$.icl
                        • API String ID: 1212759294-1154884017
                        • Opcode ID: 6f790923833d12d714980a01db06c180b772ec8971bfc363a76216e9df6e5494
                        • Instruction ID: 0d8f040821a2ac92b5ef8a187b996af878f2fac470d5ec902d239d9fbac56a89
                        • Opcode Fuzzy Hash: 6f790923833d12d714980a01db06c180b772ec8971bfc363a76216e9df6e5494
                        • Instruction Fuzzy Hash: 5B61DE71A10619BEEB14DF64CD82FBE7BB8EB08710F104219F915D61D0DB76AA91CBB0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • CharLowerBuffW.USER32(?,?), ref: 00AAA636
                        • GetDriveTypeW.KERNEL32 ref: 00AAA683
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AAA6CB
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AAA702
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AAA730
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                        • API String ID: 2698844021-4113822522
                        • Opcode ID: e881dd8613fd986bef5e9ee8cd8421d1611b2c20b0bfde24140941807ee308c0
                        • Instruction ID: 1d93b8e6a595fb923397fc4426a61c1403fe826c1c1f2c008b266df65a775006
                        • Opcode Fuzzy Hash: e881dd8613fd986bef5e9ee8cd8421d1611b2c20b0bfde24140941807ee308c0
                        • Instruction Fuzzy Hash: 76515B751043459FC740EF20CA8186BB7F4FF98758F14496DF89A972A1DB31AE0ACB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00AAA47A
                        • __swprintf.LIBCMT ref: 00AAA49C
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00AAA4D9
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00AAA4FE
                        • _memset.LIBCMT ref: 00AAA51D
                        • _wcsncpy.LIBCMT ref: 00AAA559
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00AAA58E
                        • CloseHandle.KERNEL32(00000000), ref: 00AAA599
                        • RemoveDirectoryW.KERNEL32(?), ref: 00AAA5A2
                        • CloseHandle.KERNEL32(00000000), ref: 00AAA5AC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                        • String ID: :$\$\??\%s
                        • API String ID: 2733774712-3457252023
                        • Opcode ID: cdb448bd10051b58dd80be2a9162a305c0901f5039e5762da25d533e0dab5d08
                        • Instruction ID: 21ba970caa888c9f52ba60a03ed0e29c3c9dcb14086dcf7feed6ff98bfa8b592
                        • Opcode Fuzzy Hash: cdb448bd10051b58dd80be2a9162a305c0901f5039e5762da25d533e0dab5d08
                        • Instruction Fuzzy Hash: F63172B690011AABDB21DFA0DC49FEB77BDEF89701F1041B6F908D6190E7709645CB25
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __wsplitpath.LIBCMT ref: 00AADC7B
                        • _wcscat.LIBCMT ref: 00AADC93
                        • _wcscat.LIBCMT ref: 00AADCA5
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AADCBA
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00AADCCE
                        • GetFileAttributesW.KERNEL32(?), ref: 00AADCE6
                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00AADD00
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00AADD12
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                        • String ID: *.*
                        • API String ID: 34673085-438819550
                        • Opcode ID: b3b4ad524f630b88eacf89f3d66b1c5bc478f79a0f1b652f98777d5f085ed8fb
                        • Instruction ID: 2e334c4b04c230347c6436cafa8850b9f0009ec08ccb0b5fe8884d98f22db096
                        • Opcode Fuzzy Hash: b3b4ad524f630b88eacf89f3d66b1c5bc478f79a0f1b652f98777d5f085ed8fb
                        • Instruction Fuzzy Hash: E68182755043419FCB64EF24C9459ABB7E8BB8A310F15882EF8CACB691E730D945CB62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00ACC4EC
                        • GetFocus.USER32 ref: 00ACC4FC
                        • GetDlgCtrlID.USER32(00000000), ref: 00ACC507
                        • _memset.LIBCMT ref: 00ACC632
                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00ACC65D
                        • GetMenuItemCount.USER32(?), ref: 00ACC67D
                        • GetMenuItemID.USER32(?,00000000), ref: 00ACC690
                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00ACC6C4
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00ACC70C
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00ACC744
                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00ACC779
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                        • String ID: 0
                        • API String ID: 1296962147-4108050209
                        • Opcode ID: a6a84389dd39bc9ec016ee20a1505a869eba39f678241e52f596f5ae5b5c5b5c
                        • Instruction ID: d30fee3168853dc8abc316fa8ad4be5c3b6de37e99f9a587b632775bf67784b1
                        • Opcode Fuzzy Hash: a6a84389dd39bc9ec016ee20a1505a869eba39f678241e52f596f5ae5b5c5b5c
                        • Instruction Fuzzy Hash: 76815C712083159FDB10CF24C984F6BBBE9EB88724F02452DF99997291D770D905CBA2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A9874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A98766
                          • Part of subcall function 00A9874A: GetLastError.KERNEL32(?,00A9822A,?,?,?), ref: 00A98770
                          • Part of subcall function 00A9874A: GetProcessHeap.KERNEL32(00000008,?,?,00A9822A,?,?,?), ref: 00A9877F
                          • Part of subcall function 00A9874A: HeapAlloc.KERNEL32(00000000,?,00A9822A,?,?,?), ref: 00A98786
                          • Part of subcall function 00A9874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A9879D
                          • Part of subcall function 00A987E7: GetProcessHeap.KERNEL32(00000008,00A98240,00000000,00000000,?,00A98240,?), ref: 00A987F3
                          • Part of subcall function 00A987E7: HeapAlloc.KERNEL32(00000000,?,00A98240,?), ref: 00A987FA
                          • Part of subcall function 00A987E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A98240,?), ref: 00A9880B
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A98458
                        • _memset.LIBCMT ref: 00A9846D
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A9848C
                        • GetLengthSid.ADVAPI32(?), ref: 00A9849D
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00A984DA
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A984F6
                        • GetLengthSid.ADVAPI32(?), ref: 00A98513
                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A98522
                        • HeapAlloc.KERNEL32(00000000), ref: 00A98529
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A9854A
                        • CopySid.ADVAPI32(00000000), ref: 00A98551
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A98582
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A985A8
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A985BC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                        • String ID:
                        • API String ID: 3996160137-0
                        • Opcode ID: 45ff7e8e588039d3b730e2e72221ee20a7d1c2746648b0d9730d502cd7569e6d
                        • Instruction ID: 011f834ebd128b55a726145642ce6c653aaa60387aef67f6a43a2106e97b779a
                        • Opcode Fuzzy Hash: 45ff7e8e588039d3b730e2e72221ee20a7d1c2746648b0d9730d502cd7569e6d
                        • Instruction Fuzzy Hash: FE613971A00209EFDF00DFA4DD45EAEBBB9FF05700F14816AE915A7291EB359A05CF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDC.USER32(00000000), ref: 00AB76A2
                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00AB76AE
                        • CreateCompatibleDC.GDI32(?), ref: 00AB76BA
                        • SelectObject.GDI32(00000000,?), ref: 00AB76C7
                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00AB771B
                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00AB7757
                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00AB777B
                        • SelectObject.GDI32(00000006,?), ref: 00AB7783
                        • DeleteObject.GDI32(?), ref: 00AB778C
                        • DeleteDC.GDI32(00000006), ref: 00AB7793
                        • ReleaseDC.USER32(00000000,?), ref: 00AB779E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: 1565e7a5a143f5726e0276f31762cab9072492d1846259ae867ee0254f169f19
                        • Instruction ID: 1b429b2492b697f6ea3814f5ce14dfa55a32d59bb41ee84eeebdae679a3d9f97
                        • Opcode Fuzzy Hash: 1565e7a5a143f5726e0276f31762cab9072492d1846259ae867ee0254f169f19
                        • Instruction Fuzzy Hash: E8516875904209EFCB15CFA8CC84EEEBBB9EF48710F14852DF99A97211D771A841CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,00ACFB78), ref: 00AAA0FC
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                        • LoadStringW.USER32(?,?,00000FFF,?), ref: 00AAA11E
                        • __swprintf.LIBCMT ref: 00AAA177
                        • __swprintf.LIBCMT ref: 00AAA190
                        • _wprintf.LIBCMT ref: 00AAA246
                        • _wprintf.LIBCMT ref: 00AAA264
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: LoadString__swprintf_wprintf$_memmove
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 311963372-2391861430
                        • Opcode ID: 9134767778a7ec2c42add666105ee99513210892a0eb2eb5e396b2cb2404ee16
                        • Instruction ID: 81ee2880f255bb9ae39cbc2268899ece6c24b374590d4435f4c728f78de3922e
                        • Opcode Fuzzy Hash: 9134767778a7ec2c42add666105ee99513210892a0eb2eb5e396b2cb2404ee16
                        • Instruction Fuzzy Hash: F4518C72900259BBCF15EBE0CE86EEEB7B8AF64300F104165F505630A2EB316F58CB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A60B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00A46C6C,?,00008000), ref: 00A60BB7
                          • Part of subcall function 00A448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A448A1,?,?,00A437C0,?), ref: 00A448CE
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A46D0D
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A46E5A
                          • Part of subcall function 00A459CD: _wcscpy.LIBCMT ref: 00A45A05
                          • Part of subcall function 00A6387D: _iswctype.LIBCMT ref: 00A63885
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                        • API String ID: 537147316-1018226102
                        • Opcode ID: dd4845a75fb9a0eb70270bd55e44b458e81d5b2ff5bb226e708db1d72b376af6
                        • Instruction ID: 313f514eb8b56ed09c5585e82c1a56effcec523fbf15ad18cdc7bcf12e860380
                        • Opcode Fuzzy Hash: dd4845a75fb9a0eb70270bd55e44b458e81d5b2ff5bb226e708db1d72b376af6
                        • Instruction Fuzzy Hash: 5B026C355083419FC724EF24C981AAFBBE5BFD9354F14892DF48A972A2DB30D949CB42
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00A445F9
                        • GetMenuItemCount.USER32(00B06890), ref: 00A7D7CD
                        • GetMenuItemCount.USER32(00B06890), ref: 00A7D87D
                        • GetCursorPos.USER32(?), ref: 00A7D8C1
                        • SetForegroundWindow.USER32(00000000), ref: 00A7D8CA
                        • TrackPopupMenuEx.USER32(00B06890,00000000,?,00000000,00000000,00000000), ref: 00A7D8DD
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A7D8E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                        • String ID:
                        • API String ID: 2751501086-0
                        • Opcode ID: 0f1a36ad9df7546402a9e0908a836c03267f7e506d9848d066ef2fc4a2478bff
                        • Instruction ID: e259e147734ad011b54cfd808741ac3d0712e439640f103dfedc9a718ddb856c
                        • Opcode Fuzzy Hash: 0f1a36ad9df7546402a9e0908a836c03267f7e506d9848d066ef2fc4a2478bff
                        • Instruction Fuzzy Hash: 70710574601209BFEB249F64DC85FAAFF75FF45364F208216F519AA1E0C7B16820DB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AC0038,?,?), ref: 00AC10BC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 3964851224-909552448
                        • Opcode ID: 68715e4cfa230f03c6e4629275e652809571e84db91f890254b3c8262383a55c
                        • Instruction ID: 37c4b2dcb17d5097689f03f622ad6e374cb281e68edaf07719746190627c7015
                        • Opcode Fuzzy Hash: 68715e4cfa230f03c6e4629275e652809571e84db91f890254b3c8262383a55c
                        • Instruction Fuzzy Hash: 48412A3425024EDFCF10EF90DA91EEA3734AF52340F554668FE915B292DB30AD5ACB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                          • Part of subcall function 00A47A84: _memmove.LIBCMT ref: 00A47B0D
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00AA55D2
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00AA55E8
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AA55F9
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00AA560B
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00AA561C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: SendString$_memmove
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2279737902-1007645807
                        • Opcode ID: c3911a7eda1bd41ae7b5022bf24bfcb20d7f02b3a417c8ec833bff6ff4112976
                        • Instruction ID: 605631c3a9b092ab03d77d0a0b8b3efe4a32412ddaf143a5468c7c71bc4ca9f4
                        • Opcode Fuzzy Hash: c3911a7eda1bd41ae7b5022bf24bfcb20d7f02b3a417c8ec833bff6ff4112976
                        • Instruction Fuzzy Hash: C6116068D501AD79D720A7B1CC8ADFFBA7CFFE2B40F440969B505A70D1DB601D05C5A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                        • String ID: 0.0.0.0
                        • API String ID: 208665112-3771769585
                        • Opcode ID: f07ce18c2d93284eaa53c671cce0fbd756cf0a8cb4671161b39c0edef9e887d0
                        • Instruction ID: a045d9a98d9537ea9055e4f347fa62d385b35bd7a48c90b904c31c25cb8497bb
                        • Opcode Fuzzy Hash: f07ce18c2d93284eaa53c671cce0fbd756cf0a8cb4671161b39c0edef9e887d0
                        • Instruction Fuzzy Hash: E211D231904114AFCF20EB64DD0AEEB77BCDB46720F0541B6F409A70D1EFB19A9287A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • timeGetTime.WINMM ref: 00AA521C
                          • Part of subcall function 00A60719: timeGetTime.WINMM(?,7608B400,00A50FF9), ref: 00A6071D
                        • Sleep.KERNEL32(0000000A), ref: 00AA5248
                        • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00AA526C
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00AA528E
                        • SetActiveWindow.USER32 ref: 00AA52AD
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00AA52BB
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00AA52DA
                        • Sleep.KERNEL32(000000FA), ref: 00AA52E5
                        • IsWindow.USER32 ref: 00AA52F1
                        • EndDialog.USER32(00000000), ref: 00AA5302
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: 4c8f6b7364f1bde43ef733d349731ad9e5699b6a687594c3bc7865e093891208
                        • Instruction ID: d3254af8e6a99f3141cdc9339de754133a6fc7667eeed8985a2129aa25c14494
                        • Opcode Fuzzy Hash: 4c8f6b7364f1bde43ef733d349731ad9e5699b6a687594c3bc7865e093891208
                        • Instruction Fuzzy Hash: 1C21C270644744BFEB009BB0ED98FB67B6AEB66346B051428F101831F1DFB1AC458B25
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • CoInitialize.OLE32(00000000), ref: 00AAD855
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00AAD8E8
                        • SHGetDesktopFolder.SHELL32(?), ref: 00AAD8FC
                        • CoCreateInstance.OLE32(00AD2D7C,00000000,00000001,00AFA89C,?), ref: 00AAD948
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00AAD9B7
                        • CoTaskMemFree.OLE32(?,?), ref: 00AADA0F
                        • _memset.LIBCMT ref: 00AADA4C
                        • SHBrowseForFolderW.SHELL32(?), ref: 00AADA88
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00AADAAB
                        • CoTaskMemFree.OLE32(00000000), ref: 00AADAB2
                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00AADAE9
                        • CoUninitialize.OLE32(00000001,00000000), ref: 00AADAEB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                        • String ID:
                        • API String ID: 1246142700-0
                        • Opcode ID: 94fd74b5f7a792594dc0271b68a52953dd54c9f1aeaa669cba0bafd8800e5068
                        • Instruction ID: f62c5e03f429b64307555626698cdeaa90effe8cdf321992f0896fc7682569f2
                        • Opcode Fuzzy Hash: 94fd74b5f7a792594dc0271b68a52953dd54c9f1aeaa669cba0bafd8800e5068
                        • Instruction Fuzzy Hash: F7B1FE75A00109AFDB04DFA4C988DAEBBF9FF89304B148469F54AEB261DB30ED45CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?), ref: 00AA05A7
                        • SetKeyboardState.USER32(?), ref: 00AA0612
                        • GetAsyncKeyState.USER32(000000A0), ref: 00AA0632
                        • GetKeyState.USER32(000000A0), ref: 00AA0649
                        • GetAsyncKeyState.USER32(000000A1), ref: 00AA0678
                        • GetKeyState.USER32(000000A1), ref: 00AA0689
                        • GetAsyncKeyState.USER32(00000011), ref: 00AA06B5
                        • GetKeyState.USER32(00000011), ref: 00AA06C3
                        • GetAsyncKeyState.USER32(00000012), ref: 00AA06EC
                        • GetKeyState.USER32(00000012), ref: 00AA06FA
                        • GetAsyncKeyState.USER32(0000005B), ref: 00AA0723
                        • GetKeyState.USER32(0000005B), ref: 00AA0731
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: d6c7434ed9a9dbe24b8cf00883a6231125fc7b91c20808e6323f69d3c8274c74
                        • Instruction ID: f25383f1bdfb0c73a27104b844394e0b1fe1ad1abff53a18fe8783bec299c688
                        • Opcode Fuzzy Hash: d6c7434ed9a9dbe24b8cf00883a6231125fc7b91c20808e6323f69d3c8274c74
                        • Instruction Fuzzy Hash: 7B51CB60E0478929FB35DBA08954FEABFB59F13380F08859DD5C25B1C2DBA4AA4CCB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 00A9C746
                        • GetWindowRect.USER32(00000000,?), ref: 00A9C758
                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00A9C7B6
                        • GetDlgItem.USER32(?,00000002), ref: 00A9C7C1
                        • GetWindowRect.USER32(00000000,?), ref: 00A9C7D3
                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00A9C827
                        • GetDlgItem.USER32(?,000003E9), ref: 00A9C835
                        • GetWindowRect.USER32(00000000,?), ref: 00A9C846
                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00A9C889
                        • GetDlgItem.USER32(?,000003EA), ref: 00A9C897
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A9C8B4
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00A9C8C1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: c6f504f8dd44ebbd91c9d188c97472b29ef186636d9a9cd6cd7219f24b99a22c
                        • Instruction ID: 83d70ec468c1468065b9e757b72320a9618362866e6396043544c8d336d4c805
                        • Opcode Fuzzy Hash: c6f504f8dd44ebbd91c9d188c97472b29ef186636d9a9cd6cd7219f24b99a22c
                        • Instruction Fuzzy Hash: 08512E71B00605AFDF18CFA9DD99EAEBBBAEB88311F14812DF516D7290D7709E018B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A41B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A42036,?,00000000,?,?,?,?,00A416CB,00000000,?), ref: 00A41B9A
                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00A420D3
                        • KillTimer.USER32(-00000001,?,?,?,?,00A416CB,00000000,?,?,00A41AE2,?,?), ref: 00A4216E
                        • DestroyAcceleratorTable.USER32(00000000), ref: 00A7BEF6
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A416CB,00000000,?,?,00A41AE2,?,?), ref: 00A7BF27
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A416CB,00000000,?,?,00A41AE2,?,?), ref: 00A7BF3E
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00A416CB,00000000,?,?,00A41AE2,?,?), ref: 00A7BF5A
                        • DeleteObject.GDI32(00000000), ref: 00A7BF6C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: ccb6a2e526d9d02d7ef89f70b1000fce9c92a7f15bdd9df5085e7d033809c3d4
                        • Instruction ID: 60c85dbbc623b459d2429ed53febfb7195322d26f74d80f1f00b6d9fedb4882d
                        • Opcode Fuzzy Hash: ccb6a2e526d9d02d7ef89f70b1000fce9c92a7f15bdd9df5085e7d033809c3d4
                        • Instruction Fuzzy Hash: 65615539110610DFCB259F18DD48B2AB7F2FBA0716F50C529E5468BAA0CB71ACA1DF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A425DB: GetWindowLongW.USER32(?,000000EB), ref: 00A425EC
                        • GetSysColor.USER32(0000000F), ref: 00A421D3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: e5f8334f10a68cfcc2e797714e6d85c703dec07544f76d2da199bd8193531415
                        • Instruction ID: c2d2804a34d69ad847384ac8479187c739736a736f735231d08b737320a2d6cd
                        • Opcode Fuzzy Hash: e5f8334f10a68cfcc2e797714e6d85c703dec07544f76d2da199bd8193531415
                        • Instruction Fuzzy Hash: 8741C3350001509FDB219F68EC88BF93B66EB86331F998375FE658A1E2C7718C42DB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharLowerBuffW.USER32(?,?,00ACF910), ref: 00AAAB76
                        • GetDriveTypeW.KERNEL32(00000061,00AFA620,00000061), ref: 00AAAC40
                        • _wcscpy.LIBCMT ref: 00AAAC6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharDriveLowerType_wcscpy
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2820617543-1000479233
                        • Opcode ID: 42e22f19d72d741702b0e5c789b6a4d9bff40bdf7c91a1ea455e8f5a407ffca2
                        • Instruction ID: c983df7f7fc9fef40277406bdcb0741b8d672c676a47671fa77c22a752eccc5f
                        • Opcode Fuzzy Hash: 42e22f19d72d741702b0e5c789b6a4d9bff40bdf7c91a1ea455e8f5a407ffca2
                        • Instruction Fuzzy Hash: D7519934108301AFC710EF58C981AAFB7E6EFA1300F10482DF586972E2DB319D4ACA53
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __i64tow__itow__swprintf
                        • String ID: %.15g$0x%p$False$True
                        • API String ID: 421087845-2263619337
                        • Opcode ID: dc9099c2e4e5cfcb4da9f3466f045fbc04fcf6a780089a19242e10f0abea45b4
                        • Instruction ID: 6db8fb7167bca9c3deb144762c6e2ce0a2f9674783229a4fb348867f2e03ab60
                        • Opcode Fuzzy Hash: dc9099c2e4e5cfcb4da9f3466f045fbc04fcf6a780089a19242e10f0abea45b4
                        • Instruction Fuzzy Hash: 6E41B276604205AFDB24DB78DD42F7B77F8EB84300F20886EE64DD7292EA719942CB11
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AC73D9
                        • CreateMenu.USER32 ref: 00AC73F4
                        • SetMenu.USER32(?,00000000), ref: 00AC7403
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AC7490
                        • IsMenu.USER32(?), ref: 00AC74A6
                        • CreatePopupMenu.USER32 ref: 00AC74B0
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00AC74DD
                        • DrawMenuBar.USER32 ref: 00AC74E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                        • String ID: 0$F
                        • API String ID: 176399719-3044882817
                        • Opcode ID: 70b5390de6f53648beb30ccd2b9e72cd6418fd55a6cf0f8aa538303ba7fcf0b8
                        • Instruction ID: f1a1e537030ad96a851b8d6179863bb15736c39c3d41e96eb03acf553397e54d
                        • Opcode Fuzzy Hash: 70b5390de6f53648beb30ccd2b9e72cd6418fd55a6cf0f8aa538303ba7fcf0b8
                        • Instruction Fuzzy Hash: 6341F579A01209EFDB24DFA4D984F9ABBF9FF49310F164029EA5597360DB31A920CF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00AC77CD
                        • CreateCompatibleDC.GDI32(00000000), ref: 00AC77D4
                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00AC77E7
                        • SelectObject.GDI32(00000000,00000000), ref: 00AC77EF
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00AC77FA
                        • DeleteDC.GDI32(00000000), ref: 00AC7803
                        • GetWindowLongW.USER32(?,000000EC), ref: 00AC780D
                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00AC7821
                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00AC782D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                        • String ID: static
                        • API String ID: 2559357485-2160076837
                        • Opcode ID: b10f7b7c1a1f0c69082ab796381647c0873de870e8317b117c67558795b54671
                        • Instruction ID: 564d04e74a3898d61c7bcfb45de3b6f191b4c6d40e6e2522e5bcc6a448b3fe3a
                        • Opcode Fuzzy Hash: b10f7b7c1a1f0c69082ab796381647c0873de870e8317b117c67558795b54671
                        • Instruction Fuzzy Hash: C2316D31105119BFDF119FA4DC09FDA3B6AFF09724F120229FA15A61A0DB31D862DBA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00A6707B
                          • Part of subcall function 00A68D68: __getptd_noexit.LIBCMT ref: 00A68D68
                        • __gmtime64_s.LIBCMT ref: 00A67114
                        • __gmtime64_s.LIBCMT ref: 00A6714A
                        • __gmtime64_s.LIBCMT ref: 00A67167
                        • __allrem.LIBCMT ref: 00A671BD
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A671D9
                        • __allrem.LIBCMT ref: 00A671F0
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A6720E
                        • __allrem.LIBCMT ref: 00A67225
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A67243
                        • __invoke_watson.LIBCMT ref: 00A672B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                        • String ID:
                        • API String ID: 384356119-0
                        • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                        • Instruction ID: 405ed3c0c415ed3b67f80d4dc94f893c5a4e000e5e41f893d6bf1676a5499260
                        • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                        • Instruction Fuzzy Hash: 67712A72A14717ABEB149F79CD51BAEB3B8AF15328F14823AF514E7281E770DD408B90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AA2A31
                        • GetMenuItemInfoW.USER32(00B06890,000000FF,00000000,00000030), ref: 00AA2A92
                        • SetMenuItemInfoW.USER32(00B06890,00000004,00000000,00000030), ref: 00AA2AC8
                        • Sleep.KERNEL32(000001F4), ref: 00AA2ADA
                        • GetMenuItemCount.USER32(?), ref: 00AA2B1E
                        • GetMenuItemID.USER32(?,00000000), ref: 00AA2B3A
                        • GetMenuItemID.USER32(?,-00000001), ref: 00AA2B64
                        • GetMenuItemID.USER32(?,?), ref: 00AA2BA9
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00AA2BEF
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AA2C03
                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AA2C24
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                        • String ID:
                        • API String ID: 4176008265-0
                        • Opcode ID: 9555cbdca145cb28f2a78507baedc0db914ae48f31b1d4a0f43c8f9d3e3aef1a
                        • Instruction ID: 7a730810a211e7d72eaf9654237a20a065ec12703c69e8a55dceb27104a78c12
                        • Opcode Fuzzy Hash: 9555cbdca145cb28f2a78507baedc0db914ae48f31b1d4a0f43c8f9d3e3aef1a
                        • Instruction Fuzzy Hash: C261B2B0900249AFDB21CFA8CD88FBEBBB9EB46354F144559E84197291D731AD26DB20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00AC7214
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00AC7217
                        • GetWindowLongW.USER32(?,000000F0), ref: 00AC723B
                        • _memset.LIBCMT ref: 00AC724C
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00AC725E
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00AC72D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow_memset
                        • String ID:
                        • API String ID: 830647256-0
                        • Opcode ID: 1833d0289687bbc2e5873c73ea8ea5c418917621e67bf3649e1cc01288a13891
                        • Instruction ID: ba9d0e0bf7d97a52427c4fd07c61c81bff1239ec61565f9f519aeeb533425d2c
                        • Opcode Fuzzy Hash: 1833d0289687bbc2e5873c73ea8ea5c418917621e67bf3649e1cc01288a13891
                        • Instruction Fuzzy Hash: 46616871A00248AFDB10DFA4CD81FEE77F8AB09710F15415AFA14AB2A1D770AE41DFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A97135
                        • SafeArrayAllocData.OLEAUT32(?), ref: 00A9718E
                        • VariantInit.OLEAUT32(?), ref: 00A971A0
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A971C0
                        • VariantCopy.OLEAUT32(?,?), ref: 00A97213
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A97227
                        • VariantClear.OLEAUT32(?), ref: 00A9723C
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00A97249
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A97252
                        • VariantClear.OLEAUT32(?), ref: 00A97264
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A9726F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: 7faef15a6c1ae9bda4fa340ec6cf69a92b31d3e5cd9b1e048524976f4330a088
                        • Instruction ID: 0985d8353abc234b7bef5436e689f672c21fb02c0e765299006e5565b3d3b809
                        • Opcode Fuzzy Hash: 7faef15a6c1ae9bda4fa340ec6cf69a92b31d3e5cd9b1e048524976f4330a088
                        • Instruction Fuzzy Hash: 31415F75A10219AFCF04DFA8D944DEEBBF9FF48354F018069F915A7261CB30A946CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 00AB5AA6
                        • inet_addr.WSOCK32(?,?,?), ref: 00AB5AEB
                        • gethostbyname.WSOCK32(?), ref: 00AB5AF7
                        • IcmpCreateFile.IPHLPAPI ref: 00AB5B05
                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00AB5B75
                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00AB5B8B
                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00AB5C00
                        • WSACleanup.WSOCK32 ref: 00AB5C06
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                        • String ID: Ping
                        • API String ID: 1028309954-2246546115
                        • Opcode ID: c207695b15c2f5d7db0c140ceaae6dceabcc557fe745fc127ae72f6be8b8d1b8
                        • Instruction ID: 22608f97cdf1296231c1457dd17675af36165b54c662f7921a0a61166878ef02
                        • Opcode Fuzzy Hash: c207695b15c2f5d7db0c140ceaae6dceabcc557fe745fc127ae72f6be8b8d1b8
                        • Instruction Fuzzy Hash: 42516E31A047009FDB10EF74CD89B6ABBE9EF88750F148929F555DB2A2EB70E841DB41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00AAB73B
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00AAB7B1
                        • GetLastError.KERNEL32 ref: 00AAB7BB
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00AAB828
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: e85d7fb029b49daf6969ea20f267eff89eeb33be0ba5743889d63a4c5e583b84
                        • Instruction ID: 2538febadcf2a931a20505d2a541689ae7c01a0a143489b130aa493c9d76d76e
                        • Opcode Fuzzy Hash: e85d7fb029b49daf6969ea20f267eff89eeb33be0ba5743889d63a4c5e583b84
                        • Instruction Fuzzy Hash: 6B318535A01209AFDB10EFA4C985ABE7BB4FF96740F144025F506D72D2DBB19942C7A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00A9B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A9B0E7
                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00A994F6
                        • GetDlgCtrlID.USER32 ref: 00A99501
                        • GetParent.USER32 ref: 00A9951D
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A99520
                        • GetDlgCtrlID.USER32(?), ref: 00A99529
                        • GetParent.USER32(?), ref: 00A99545
                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A99548
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 1536045017-1403004172
                        • Opcode ID: 7b12a3f3dab92b8987bca310eceeb05e7fd3bdf1f9f993715631aa6152a64e00
                        • Instruction ID: 541f30842f1c150b7a5552a0d8c81fd71797ab1443929ba2f4212e7f709070d5
                        • Opcode Fuzzy Hash: 7b12a3f3dab92b8987bca310eceeb05e7fd3bdf1f9f993715631aa6152a64e00
                        • Instruction Fuzzy Hash: 5321C174A00208BFDF05EBA4CC85EFEBBB5EF89300F114129B961972A2DB755919DB20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00A9B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A9B0E7
                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00A995DF
                        • GetDlgCtrlID.USER32 ref: 00A995EA
                        • GetParent.USER32 ref: 00A99606
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A99609
                        • GetDlgCtrlID.USER32(?), ref: 00A99612
                        • GetParent.USER32(?), ref: 00A9962E
                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A99631
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 1536045017-1403004172
                        • Opcode ID: 030e71b67dfaa5e6f2c070f5f8e3d5ce62e31465e7677a9809237442f581a283
                        • Instruction ID: 4ab99baddd7dc729eb1609e0ff8640131e35f033638b538ae7fc6077acab3bde
                        • Opcode Fuzzy Hash: 030e71b67dfaa5e6f2c070f5f8e3d5ce62e31465e7677a9809237442f581a283
                        • Instruction Fuzzy Hash: 1621B374A00248BFDF05EBA4CD85EFFBBB9EF98300F114019BA51972A1DB759919DB20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetParent.USER32 ref: 00A99651
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00A99666
                        • _wcscmp.LIBCMT ref: 00A99678
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A996F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend_wcscmp
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1704125052-3381328864
                        • Opcode ID: 29d706807baaf21527e9e5415b4b9a39538bfbc32713fc617f3a199189692bf9
                        • Instruction ID: c58ec52cd7117273e147909ec1b29ddb92d914180f3f828c940d5541983548c9
                        • Opcode Fuzzy Hash: 29d706807baaf21527e9e5415b4b9a39538bfbc32713fc617f3a199189692bf9
                        • Instruction Fuzzy Hash: F811E977348317BAFE052768DC07EB777EC9F05760F20016AFB00A50D1FEA169569A58
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00AB8BEC
                        • CoInitialize.OLE32(00000000), ref: 00AB8C19
                        • CoUninitialize.OLE32 ref: 00AB8C23
                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00AB8D23
                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00AB8E50
                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00AD2C0C), ref: 00AB8E84
                        • CoGetObject.OLE32(?,00000000,00AD2C0C,?), ref: 00AB8EA7
                        • SetErrorMode.KERNEL32(00000000), ref: 00AB8EBA
                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00AB8F3A
                        • VariantClear.OLEAUT32(?), ref: 00AB8F4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                        • String ID:
                        • API String ID: 2395222682-0
                        • Opcode ID: fbf35b8ef4db686f18f6df9e47c880dee1bc7a984c91a90a6127e4206a3485d5
                        • Instruction ID: cb969da72f46c91ec529b7bcd69e0b19dd37df21fe7ee049766752ef06886ec4
                        • Opcode Fuzzy Hash: fbf35b8ef4db686f18f6df9e47c880dee1bc7a984c91a90a6127e4206a3485d5
                        • Instruction Fuzzy Hash: 15C124B1208305AFC700DF68C98496BB7EDBF89748F00491DF58A9B252DB75ED06CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __swprintf.LIBCMT ref: 00AA419D
                        • __swprintf.LIBCMT ref: 00AA41AA
                          • Part of subcall function 00A638D8: __woutput_l.LIBCMT ref: 00A63931
                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 00AA41D4
                        • LoadResource.KERNEL32(?,00000000), ref: 00AA41E0
                        • LockResource.KERNEL32(00000000), ref: 00AA41ED
                        • FindResourceW.KERNEL32(?,?,00000003), ref: 00AA420D
                        • LoadResource.KERNEL32(?,00000000), ref: 00AA421F
                        • SizeofResource.KERNEL32(?,00000000), ref: 00AA422E
                        • LockResource.KERNEL32(?), ref: 00AA423A
                        • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00AA429B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                        • String ID:
                        • API String ID: 1433390588-0
                        • Opcode ID: c507ecc5cc5191071953d82c363a352717278a0ef9afba90df2b67e8b8a845ea
                        • Instruction ID: 50d4561727faec738468a3c5562e5ce81560d8dac1c5794429773de352e6e09c
                        • Opcode Fuzzy Hash: c507ecc5cc5191071953d82c363a352717278a0ef9afba90df2b67e8b8a845ea
                        • Instruction Fuzzy Hash: 74319DB1A0520AAFDB119FA0DC44EFBBBADEF59301F004525F905D3190EBB0DA568BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00AA1700
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00AA0778,?,00000001), ref: 00AA1714
                        • GetWindowThreadProcessId.USER32(00000000), ref: 00AA171B
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AA0778,?,00000001), ref: 00AA172A
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00AA173C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AA0778,?,00000001), ref: 00AA1755
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00AA0778,?,00000001), ref: 00AA1767
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00AA0778,?,00000001), ref: 00AA17AC
                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00AA0778,?,00000001), ref: 00AA17C1
                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00AA0778,?,00000001), ref: 00AA17CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: c7c70e31abe36c7b2aaca166c232313c1556f6f3fa5b9631bc67019a73de7206
                        • Instruction ID: 01ae5c10aa6dd786af8c8ea29db1129cb91d23bcf5fb097cc3a031d288a34ebf
                        • Opcode Fuzzy Hash: c7c70e31abe36c7b2aaca166c232313c1556f6f3fa5b9631bc67019a73de7206
                        • Instruction Fuzzy Hash: 4A31BD75A40245BFEB12DF64DC88F69BBEAAB26751F114024F900C72E0DF70AD418FA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00A4FC06
                        • OleUninitialize.OLE32(?,00000000), ref: 00A4FCA5
                        • UnregisterHotKey.USER32(?), ref: 00A4FDFC
                        • DestroyWindow.USER32(?), ref: 00A84A00
                        • FreeLibrary.KERNEL32(?), ref: 00A84A65
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A84A92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 469580280-3243417748
                        • Opcode ID: 138603dda23a062aee514844282f6b8acb70d870ccf4286fcb21fb73aa5eff25
                        • Instruction ID: 42387e2423e5e270821438859d727f2032859a98883e656809110a71f6939bf9
                        • Opcode Fuzzy Hash: 138603dda23a062aee514844282f6b8acb70d870ccf4286fcb21fb73aa5eff25
                        • Instruction Fuzzy Hash: D0A16C34B01212CFCB29EF54C595E6AF7B4BF48740F1542ADE90AAB262DB30AD16CF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • EnumChildWindows.USER32(?,00A9AA64), ref: 00A9A9A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ChildEnumWindows
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                        • API String ID: 3555792229-1603158881
                        • Opcode ID: f4ee810400f61d010ed9f9f464db07ac3adfd26a1b127b75bb57853cc243fbf4
                        • Instruction ID: 7c6078c0564e7037c05bd4086586ceecd0df399236008171dd5c95a1c2330d47
                        • Opcode Fuzzy Hash: f4ee810400f61d010ed9f9f464db07ac3adfd26a1b127b75bb57853cc243fbf4
                        • Instruction Fuzzy Hash: 9F917230B00506EBDF58DFA0C581BEAFBB5BF14304F50811AE99AA7151DB306A9ACBD1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00A42EAE
                          • Part of subcall function 00A41DB3: GetClientRect.USER32(?,?), ref: 00A41DDC
                          • Part of subcall function 00A41DB3: GetWindowRect.USER32(?,?), ref: 00A41E1D
                          • Part of subcall function 00A41DB3: ScreenToClient.USER32(?,?), ref: 00A41E45
                        • GetDC.USER32 ref: 00A7CF82
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A7CF95
                        • SelectObject.GDI32(00000000,00000000), ref: 00A7CFA3
                        • SelectObject.GDI32(00000000,00000000), ref: 00A7CFB8
                        • ReleaseDC.USER32(?,00000000), ref: 00A7CFC0
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A7D04B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: 47c6b55bd6a6bc5bc90024574b00a7642a60f45a22851604900daba6d24c7f40
                        • Instruction ID: a961aa1e1ae39c52788565ea3c28391c438b35ba37835cc5f19853288e6269ff
                        • Opcode Fuzzy Hash: 47c6b55bd6a6bc5bc90024574b00a7642a60f45a22851604900daba6d24c7f40
                        • Instruction Fuzzy Hash: C471B434500205DFCF21CF64CD85AAA7BB6FF89360F14C26AFD5A5A2A6C7318C52DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                          • Part of subcall function 00A42344: GetCursorPos.USER32(?), ref: 00A42357
                          • Part of subcall function 00A42344: ScreenToClient.USER32(00B067B0,?), ref: 00A42374
                          • Part of subcall function 00A42344: GetAsyncKeyState.USER32(00000001), ref: 00A42399
                          • Part of subcall function 00A42344: GetAsyncKeyState.USER32(00000002), ref: 00A423A7
                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00ACC2E4
                        • ImageList_EndDrag.COMCTL32 ref: 00ACC2EA
                        • ReleaseCapture.USER32 ref: 00ACC2F0
                        • SetWindowTextW.USER32(?,00000000), ref: 00ACC39A
                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00ACC3AD
                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00ACC48F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                        • API String ID: 1924731296-2107944366
                        • Opcode ID: dd076c455a69d2517c422f1fdadf432e6d1f47e7c78ebf1dde191edadcd909b5
                        • Instruction ID: 132cfed8b1329d38c399625f8588453ce337868425960354f57abfe8b6b62206
                        • Opcode Fuzzy Hash: dd076c455a69d2517c422f1fdadf432e6d1f47e7c78ebf1dde191edadcd909b5
                        • Instruction Fuzzy Hash: D051BD74204304AFDB04EF24CD56F6A7BE5FB98310F00892DF5958B2E1DB30A959CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00ACF910), ref: 00AB903D
                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00ACF910), ref: 00AB9071
                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00AB91EB
                        • SysFreeString.OLEAUT32(?), ref: 00AB9215
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                        • String ID:
                        • API String ID: 560350794-0
                        • Opcode ID: fa4c39e06b5b69991f5b05ed5b49f68d6c832b42b656a62fabf50bc8088519b2
                        • Instruction ID: d0a0e75f9155811c6f928e058fdb8e486de611231b692fc7a97463dd9c718fd5
                        • Opcode Fuzzy Hash: fa4c39e06b5b69991f5b05ed5b49f68d6c832b42b656a62fabf50bc8088519b2
                        • Instruction Fuzzy Hash: 8DF10775A00109EFDB04DF98C888EEEB7B9BF89314F108559F615AB252DB31AE46CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00ABF9C9
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00ABFB5C
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00ABFB80
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00ABFBC0
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00ABFBE2
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00ABFD5E
                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00ABFD90
                        • CloseHandle.KERNEL32(?), ref: 00ABFDBF
                        • CloseHandle.KERNEL32(?), ref: 00ABFE36
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                        • String ID:
                        • API String ID: 4090791747-0
                        • Opcode ID: 975caf8942e79cb91afbddc989b612fa8f5829fb44cdf520fb1b38903696da5c
                        • Instruction ID: aa926bd443b51dd5910d9aaf619e282e0031b7d4ea97ddd4307c241255f39603
                        • Opcode Fuzzy Hash: 975caf8942e79cb91afbddc989b612fa8f5829fb44cdf520fb1b38903696da5c
                        • Instruction Fuzzy Hash: 07E1A1312043419FCB14EF24C991BABBBE5BF85354F18896DF8999B2A2CB31DC45CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00AA48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AA38D3,?), ref: 00AA48C7
                          • Part of subcall function 00AA48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AA38D3,?), ref: 00AA48E0
                          • Part of subcall function 00AA4CD3: GetFileAttributesW.KERNEL32(?,00AA3947), ref: 00AA4CD4
                        • lstrcmpiW.KERNEL32(?,?), ref: 00AA4FE2
                        • _wcscmp.LIBCMT ref: 00AA4FFC
                        • MoveFileW.KERNEL32(?,?), ref: 00AA5017
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                        • String ID:
                        • API String ID: 793581249-0
                        • Opcode ID: 4ae77f6792f9a3ed2a26b2aaff4dbcb4bfb6f59ea8ef63389a64533bf2981f26
                        • Instruction ID: d4a3435eb94b20f9b4bd38b22fe48494a29c03a823650bbbc0c7c46ceb13b8fa
                        • Opcode Fuzzy Hash: 4ae77f6792f9a3ed2a26b2aaff4dbcb4bfb6f59ea8ef63389a64533bf2981f26
                        • Instruction Fuzzy Hash: 5A5185B24087849FC724EB60CD819DFB3ECAFC5341F00492EB189C3191EF75A5888766
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00AC896E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: InvalidateRect
                        • String ID:
                        • API String ID: 634782764-0
                        • Opcode ID: 746e9ca93043fcd2e117bcb804ec54e7a2c6895b2c544ba4a421ffa500fa622d
                        • Instruction ID: aace88c12d0bf7c1653719d07c8cfe7ef1bc06f13403f5e567de50f6da765560
                        • Opcode Fuzzy Hash: 746e9ca93043fcd2e117bcb804ec54e7a2c6895b2c544ba4a421ffa500fa622d
                        • Instruction Fuzzy Hash: 6851B330600209BFDF20DF28CC85FAA3BA5FB05390F62411BF515EA5A5DF79AD908B51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00A7C547
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A7C569
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A7C581
                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00A7C59F
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A7C5C0
                        • DestroyIcon.USER32(00000000), ref: 00A7C5CF
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A7C5EC
                        • DestroyIcon.USER32(?), ref: 00A7C5FB
                          • Part of subcall function 00ACA71E: DeleteObject.GDI32(00000000), ref: 00ACA757
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                        • String ID:
                        • API String ID: 2819616528-0
                        • Opcode ID: 0b2ba7cd7258a10bf78c57882707296212e81b8913fee1194fd893195a752126
                        • Instruction ID: 37f3b34eda706992f895d5156329f500b3fb9ab50f312b3ab113464f736e9c1b
                        • Opcode Fuzzy Hash: 0b2ba7cd7258a10bf78c57882707296212e81b8913fee1194fd893195a752126
                        • Instruction Fuzzy Hash: 4C516974640209AFDB24DF64CC85FAA7BB5EB98320F108529F906D72A0DB71ED91DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00A98A84,00000B00,?,?), ref: 00A98E0C
                        • HeapAlloc.KERNEL32(00000000,?,00A98A84,00000B00,?,?), ref: 00A98E13
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A98A84,00000B00,?,?), ref: 00A98E28
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00A98A84,00000B00,?,?), ref: 00A98E30
                        • DuplicateHandle.KERNEL32(00000000,?,00A98A84,00000B00,?,?), ref: 00A98E33
                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00A98A84,00000B00,?,?), ref: 00A98E43
                        • GetCurrentProcess.KERNEL32(00A98A84,00000000,?,00A98A84,00000B00,?,?), ref: 00A98E4B
                        • DuplicateHandle.KERNEL32(00000000,?,00A98A84,00000B00,?,?), ref: 00A98E4E
                        • CreateThread.KERNEL32(00000000,00000000,00A98E74,00000000,00000000,00000000), ref: 00A98E68
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: c5c783c04a0eccf2889d56f3295b4a66267c36512863c1b7364741b64602d781
                        • Instruction ID: 2ea20ccf627ee3159819e7f8e10bce51ea06f6d1c373e5965f569ab26cd21c2b
                        • Opcode Fuzzy Hash: c5c783c04a0eccf2889d56f3295b4a66267c36512863c1b7364741b64602d781
                        • Instruction Fuzzy Hash: B401A4B9240308FFEA10EBA5DC49F6B7BADEB89711F054521FB05DB2A1CA7498018A20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$_memset
                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2862541840-625585964
                        • Opcode ID: 2763e9aab957b0d039e79622c219097e4a43f538faabd2ff8b1c55f1d013011f
                        • Instruction ID: bfa81a5d54fbc55546e0507beb0e701e8359b6b4158041e4c535dd35ab7cd1fe
                        • Opcode Fuzzy Hash: 2763e9aab957b0d039e79622c219097e4a43f538faabd2ff8b1c55f1d013011f
                        • Instruction Fuzzy Hash: 8A91AC71A00219ABDF24DFA5C858FEFBBB8EF45710F108559F609AB282D7709945CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A97652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?,?,?,00A9799D), ref: 00A9766F
                          • Part of subcall function 00A97652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?,?), ref: 00A9768A
                          • Part of subcall function 00A97652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?,?), ref: 00A97698
                          • Part of subcall function 00A97652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?), ref: 00A976A8
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00AB9B1B
                        • _memset.LIBCMT ref: 00AB9B28
                        • _memset.LIBCMT ref: 00AB9C6B
                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00AB9C97
                        • CoTaskMemFree.OLE32(?), ref: 00AB9CA2
                        Strings
                        • NULL Pointer assignment, xrefs: 00AB9CF0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                        • String ID: NULL Pointer assignment
                        • API String ID: 1300414916-2785691316
                        • Opcode ID: 97b7ee01f169ac0b533fa5263306037ce5bfe4cd3ed697f7a48e765e9a7b984d
                        • Instruction ID: 4d99c8610f29d7643f182392d909274395a968fdbb2e1a2d7d0336a302f1a3a7
                        • Opcode Fuzzy Hash: 97b7ee01f169ac0b533fa5263306037ce5bfe4cd3ed697f7a48e765e9a7b984d
                        • Instruction Fuzzy Hash: 1F914871D00228EFDF10DFA5DD84ADEBBB9AF49310F20416AF519A7282DB715A45CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00AC7093
                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 00AC70A7
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00AC70C1
                        • _wcscat.LIBCMT ref: 00AC711C
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00AC7133
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00AC7161
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcscat
                        • String ID: SysListView32
                        • API String ID: 307300125-78025650
                        • Opcode ID: b617e42cd20e2a913d9ac462c5f8ce27f5f3987e46498cf15458cf8d98c742ec
                        • Instruction ID: c51feee8a4c7caba8d13785629c0935c63f1f5bdd08fe29e8ec0b6e704418793
                        • Opcode Fuzzy Hash: b617e42cd20e2a913d9ac462c5f8ce27f5f3987e46498cf15458cf8d98c742ec
                        • Instruction Fuzzy Hash: 40418E71A04308AFDB219FA4CC85FEE77F9EB08350F11452EF984A7292D6729D858B60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00AA3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00AA3EB6
                          • Part of subcall function 00AA3E91: Process32FirstW.KERNEL32(00000000,?), ref: 00AA3EC4
                          • Part of subcall function 00AA3E91: CloseHandle.KERNEL32(00000000), ref: 00AA3F8E
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00ABECB8
                        • GetLastError.KERNEL32 ref: 00ABECCB
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00ABECFA
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00ABED77
                        • GetLastError.KERNEL32(00000000), ref: 00ABED82
                        • CloseHandle.KERNEL32(00000000), ref: 00ABEDB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: dfb80339d6af4fc1d2ecda7e07c506782a7b1d86563f36572f53629b1b037558
                        • Instruction ID: 37bf1935d7946f6d9166323db834da523945256b75f09ca55db1c0c250fad0bf
                        • Opcode Fuzzy Hash: dfb80339d6af4fc1d2ecda7e07c506782a7b1d86563f36572f53629b1b037558
                        • Instruction Fuzzy Hash: D641AB71200200AFDB14EF24CD95FAEB7A5AF80714F188469F9429B3D3DBB5A815CB96
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 00AA32C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: 621169bfc5342bead9f035455eaa888560d457bd82cda1ed53f434de2a52140a
                        • Instruction ID: b2a3027db10ac0c3f9c537108ef5877fba4de20baaa1ef36f0c05eb310c44db6
                        • Opcode Fuzzy Hash: 621169bfc5342bead9f035455eaa888560d457bd82cda1ed53f434de2a52140a
                        • Instruction Fuzzy Hash: 7111E73370834ABAAF015B94DC43EEAB7ACEF3B370F20006AF504A71C1E7656B4545A5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00AA454E
                        • LoadStringW.USER32(00000000), ref: 00AA4555
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00AA456B
                        • LoadStringW.USER32(00000000), ref: 00AA4572
                        • _wprintf.LIBCMT ref: 00AA4598
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AA45B6
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 00AA4593
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wprintf
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 3648134473-3128320259
                        • Opcode ID: 473d08eb91cf7a10bd71f5e97a4c4e16e365557c613ced5fbb0e15f8a6d382d3
                        • Instruction ID: 8c4cc79df565e3f929cc48eaba96a19b872524ff2618af2b487febf6a8aa8084
                        • Opcode Fuzzy Hash: 473d08eb91cf7a10bd71f5e97a4c4e16e365557c613ced5fbb0e15f8a6d382d3
                        • Instruction Fuzzy Hash: 200162F2900208BFE710E7E0DD89EF7776DE708301F0005A5BB49D2051EA749E868B74
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • GetSystemMetrics.USER32(0000000F), ref: 00ACD78A
                        • GetSystemMetrics.USER32(0000000F), ref: 00ACD7AA
                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00ACD9E5
                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00ACDA03
                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00ACDA24
                        • ShowWindow.USER32(00000003,00000000), ref: 00ACDA43
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00ACDA68
                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00ACDA8B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                        • String ID:
                        • API String ID: 1211466189-0
                        • Opcode ID: 700028630a0d5c139127816c58e1bc1d7e489c4a2e36c661b5e37a736a9f9770
                        • Instruction ID: 9eca92d4498bdcf0b4c305095822ac0b5f1fb508f69609fc9248c75fcaa06bfb
                        • Opcode Fuzzy Hash: 700028630a0d5c139127816c58e1bc1d7e489c4a2e36c661b5e37a736a9f9770
                        • Instruction Fuzzy Hash: 98B16875600225EFDF14CF68C985BBD7BB1BF48701F0A8179EC48AB695DB34A950CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A7C417,00000004,00000000,00000000,00000000), ref: 00A42ACF
                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00A7C417,00000004,00000000,00000000,00000000,000000FF), ref: 00A42B17
                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00A7C417,00000004,00000000,00000000,00000000), ref: 00A7C46A
                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A7C417,00000004,00000000,00000000,00000000), ref: 00A7C4D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: d9c5e2dfb6eb4495f7dfa313ce3e36090db89bdd7fc806fc0928b5b5b27bec26
                        • Instruction ID: c23203b1b69d4e3f70682b2dd1d4869165e7c37057f2d1d545b0c71d0f1c5f88
                        • Opcode Fuzzy Hash: d9c5e2dfb6eb4495f7dfa313ce3e36090db89bdd7fc806fc0928b5b5b27bec26
                        • Instruction Fuzzy Hash: FB415A392087809EDB758B28CC9CB7B7BA2EBC5350F99C83DF84B87560C6759846D710
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00AA737F
                          • Part of subcall function 00A60FF6: std::exception::exception.LIBCMT ref: 00A6102C
                          • Part of subcall function 00A60FF6: __CxxThrowException@8.LIBCMT ref: 00A61041
                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00AA73B6
                        • EnterCriticalSection.KERNEL32(?), ref: 00AA73D2
                        • _memmove.LIBCMT ref: 00AA7420
                        • _memmove.LIBCMT ref: 00AA743D
                        • LeaveCriticalSection.KERNEL32(?), ref: 00AA744C
                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00AA7461
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AA7480
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                        • String ID:
                        • API String ID: 256516436-0
                        • Opcode ID: d23bd92034b5a47526511a459b791f53c0e327e3a4084d2e16d60e82cdf23b20
                        • Instruction ID: 1ad4a1a4624190ddb2344b84cd9a7f56515ce6e84af97b1cd5e8ca33619788fc
                        • Opcode Fuzzy Hash: d23bd92034b5a47526511a459b791f53c0e327e3a4084d2e16d60e82cdf23b20
                        • Instruction Fuzzy Hash: 13319C71904205EFCF10EFA4DD85EAFBBB8EF45710B1541B5F904AB286DB309A51CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00AC645A
                        • GetDC.USER32(00000000), ref: 00AC6462
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00AC646D
                        • ReleaseDC.USER32(00000000,00000000), ref: 00AC6479
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00AC64B5
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00AC64C6
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00AC9299,?,?,000000FF,00000000,?,000000FF,?), ref: 00AC6500
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00AC6520
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: b9c6285907edbd2a7e640992e214fb845b5cf7a74e694b266cff9c0e9bebd98b
                        • Instruction ID: 0d86237f1a7fd92e6d3c77a90414eb6709bdbafe455fed7fedf91e5c1cde21e0
                        • Opcode Fuzzy Hash: b9c6285907edbd2a7e640992e214fb845b5cf7a74e694b266cff9c0e9bebd98b
                        • Instruction Fuzzy Hash: 12316D72201214BFEB118F50CC4AFEA3FAAEF09761F054065FE089A291D6759842CB64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: cebe5dc57e07c6e0ebe9ac134159ad79d9061d147d5fd7059293bc157627a9cb
                        • Instruction ID: be360837679ad6d55a6c6afd3b44facb699c7e3910ebb356f5b140b6b0b2ff57
                        • Opcode Fuzzy Hash: cebe5dc57e07c6e0ebe9ac134159ad79d9061d147d5fd7059293bc157627a9cb
                        • Instruction Fuzzy Hash: F2219579701A05B7EA14A6219E46FAB37EDAF203B4F184021FD0696383E795DE12C2B5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                          • Part of subcall function 00A5FEC6: _wcscpy.LIBCMT ref: 00A5FEE9
                        • _wcstok.LIBCMT ref: 00AAEEFF
                        • _wcscpy.LIBCMT ref: 00AAEF8E
                        • _memset.LIBCMT ref: 00AAEFC1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                        • String ID: X
                        • API String ID: 774024439-3081909835
                        • Opcode ID: 2afa145b327f7f5c191c5aabd9888b69370779d7228b7215945dd9a4f9cd58bd
                        • Instruction ID: 49f7f26677e9132699a4045a31f75aeeb88b3dd12defe491f06c3fd9ece7ec74
                        • Opcode Fuzzy Hash: 2afa145b327f7f5c191c5aabd9888b69370779d7228b7215945dd9a4f9cd58bd
                        • Instruction Fuzzy Hash: 41C13B755083409FC724EF64CA85A6FB7E4EF85310F04496DF9999B2A2DB30ED45CB82
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00AB6F14
                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00AB6F35
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB6F48
                        • htons.WSOCK32(?,?,?,00000000,?), ref: 00AB6FFE
                        • inet_ntoa.WSOCK32(?), ref: 00AB6FBB
                          • Part of subcall function 00A9AE14: _strlen.LIBCMT ref: 00A9AE1E
                          • Part of subcall function 00A9AE14: _memmove.LIBCMT ref: 00A9AE40
                        • _strlen.LIBCMT ref: 00AB7058
                        • _memmove.LIBCMT ref: 00AB70C1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                        • String ID:
                        • API String ID: 3619996494-0
                        • Opcode ID: a1d568ee7d0cd2d4a62bf067278864edaf3b4b9edc9b4b322828a4141464acd1
                        • Instruction ID: 9abeb51e8a6c7f1d57946053af0db48f6f7b6e5e0fb9fc8473537ffa236cd783
                        • Opcode Fuzzy Hash: a1d568ee7d0cd2d4a62bf067278864edaf3b4b9edc9b4b322828a4141464acd1
                        • Instruction Fuzzy Hash: B781CD75608300AFC710EB24CD86EAFB3E9AFC4714F104929F5559B2A2DAB0ED01CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4663b1ede071aa51953a08212fd8d9406b55c964ca5f7facd75350fb93326341
                        • Instruction ID: 17afcb905fbec5aecf03ab5f6250a8740e4b772a6a5e2a34446f918c1ebf4163
                        • Opcode Fuzzy Hash: 4663b1ede071aa51953a08212fd8d9406b55c964ca5f7facd75350fb93326341
                        • Instruction Fuzzy Hash: 00715874900109EFCB04CF98CC89EBEBB79FF85310F24C159F915AA251C774AA92CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • IsWindow.USER32(01535720), ref: 00ACB6A5
                        • IsWindowEnabled.USER32(01535720), ref: 00ACB6B1
                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00ACB795
                        • SendMessageW.USER32(01535720,000000B0,?,?), ref: 00ACB7CC
                        • IsDlgButtonChecked.USER32(?,?), ref: 00ACB809
                        • GetWindowLongW.USER32(01535720,000000EC), ref: 00ACB82B
                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00ACB843
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                        • String ID:
                        • API String ID: 4072528602-0
                        • Opcode ID: 12695315d2a556023cdafcaf075ef749aca3182bf73479e3f539bd4f593a27d7
                        • Instruction ID: 57a758425a4b42cb89ebad3eccd367fc1936996bb1f7313da402f6cc3df56910
                        • Opcode Fuzzy Hash: 12695315d2a556023cdafcaf075ef749aca3182bf73479e3f539bd4f593a27d7
                        • Instruction Fuzzy Hash: 76719C34611204EFDB21DFA4C896FAA7BF9EF49300F16406DE945A73A1C732AC51CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00ABF75C
                        • _memset.LIBCMT ref: 00ABF825
                        • ShellExecuteExW.SHELL32(?), ref: 00ABF86A
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                          • Part of subcall function 00A5FEC6: _wcscpy.LIBCMT ref: 00A5FEE9
                        • GetProcessId.KERNEL32(00000000), ref: 00ABF8E1
                        • CloseHandle.KERNEL32(00000000), ref: 00ABF910
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                        • String ID: @
                        • API String ID: 3522835683-2766056989
                        • Opcode ID: 64835ab2905a77af7792a90e3b8d00dee6d21a09b861e1e403cfc3fca7109c29
                        • Instruction ID: 2a159103326fe876cb2af43927dd336ecc4c26293c021f5b259f21fed43f4f37
                        • Opcode Fuzzy Hash: 64835ab2905a77af7792a90e3b8d00dee6d21a09b861e1e403cfc3fca7109c29
                        • Instruction Fuzzy Hash: 08619175A00619DFCF14DFA4C9859AEBBF5FF88310F158469E856AB352CB30AE41CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetParent.USER32(?), ref: 00AA149C
                        • GetKeyboardState.USER32(?), ref: 00AA14B1
                        • SetKeyboardState.USER32(?), ref: 00AA1512
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00AA1540
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00AA155F
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00AA15A5
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00AA15C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: b744e5e8804343d07706befef2f406f8e9c21e38298a70ad761a29a5dc9b6fe3
                        • Instruction ID: 21641da6647be6aaab86d1331bdd022a5aebdf12080c00dc0701b0c063b79243
                        • Opcode Fuzzy Hash: b744e5e8804343d07706befef2f406f8e9c21e38298a70ad761a29a5dc9b6fe3
                        • Instruction Fuzzy Hash: F451B2A0A047D63EFB364778CC45BBABEA95B47304F0C8589E1D6978D2D398EC84DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetParent.USER32(00000000), ref: 00AA12B5
                        • GetKeyboardState.USER32(?), ref: 00AA12CA
                        • SetKeyboardState.USER32(?), ref: 00AA132B
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00AA1357
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00AA1374
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00AA13B8
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00AA13D9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: e97dfe98b4e834e027fb6224ccfd21e83024b4d7528030f1856c123b78fdaa5b
                        • Instruction ID: de0f47e79f60aa7fb2ab7aff050d4ec2f6aef0781ae3c84a87c8db707b08b2d6
                        • Opcode Fuzzy Hash: e97dfe98b4e834e027fb6224ccfd21e83024b4d7528030f1856c123b78fdaa5b
                        • Instruction Fuzzy Hash: 4E51C4A0A047D53EFB3287248C55BBABFA95F07300F088989E1D55B8C2D395EC98D761
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcsncpy$LocalTime
                        • String ID:
                        • API String ID: 2945705084-0
                        • Opcode ID: a0c315e0cb1818659f0b1221cc666f5bc49d32aa9bddce957c5c83cb9c985a66
                        • Instruction ID: 3178b4b4a2e4a86507a09019fc2fd86519fcfdeea8315d35c43a8a2739b65d91
                        • Opcode Fuzzy Hash: a0c315e0cb1818659f0b1221cc666f5bc49d32aa9bddce957c5c83cb9c985a66
                        • Instruction Fuzzy Hash: FA4181A6D2062876CB10EBB4898AACFB7BCAF05310F508566F518E3161F734E715C7A9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00AA48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AA38D3,?), ref: 00AA48C7
                          • Part of subcall function 00AA48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AA38D3,?), ref: 00AA48E0
                        • lstrcmpiW.KERNEL32(?,?), ref: 00AA38F3
                        • _wcscmp.LIBCMT ref: 00AA390F
                        • MoveFileW.KERNEL32(?,?), ref: 00AA3927
                        • _wcscat.LIBCMT ref: 00AA396F
                        • SHFileOperationW.SHELL32(?), ref: 00AA39DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                        • String ID: \*.*
                        • API String ID: 1377345388-1173974218
                        • Opcode ID: 030e8bb516e92cace9525804b9ac250994288d58e94d0dd9ab9028ecd498c026
                        • Instruction ID: 40c9c1540309847fe9fb223f5dc33023a981bb5194173533e8e4a0d78312990b
                        • Opcode Fuzzy Hash: 030e8bb516e92cace9525804b9ac250994288d58e94d0dd9ab9028ecd498c026
                        • Instruction Fuzzy Hash: C641A2B250C3849ECB51EF64C591AEFB7ECAF89340F14092EB489C3291EB74D649C752
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AC7519
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AC75C0
                        • IsMenu.USER32(?), ref: 00AC75D8
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00AC7620
                        • DrawMenuBar.USER32 ref: 00AC7633
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert_memset
                        • String ID: 0
                        • API String ID: 3866635326-4108050209
                        • Opcode ID: d2d081e88a1e4715af0a9163d9bc92839b67d4ca8101a04b259652ac2dca5ee4
                        • Instruction ID: 434fafd13c4ccbbd703f7852fedebbb2d4bd6194811f437d472091aa8eb6e515
                        • Opcode Fuzzy Hash: d2d081e88a1e4715af0a9163d9bc92839b67d4ca8101a04b259652ac2dca5ee4
                        • Instruction Fuzzy Hash: 49412975A04649EFDB10DF58D884E9EBBF9FB04310F058129E9159B250DB30AD51CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00AC125C
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00AC1286
                        • FreeLibrary.KERNEL32(00000000), ref: 00AC133D
                          • Part of subcall function 00AC122D: RegCloseKey.ADVAPI32(?), ref: 00AC12A3
                          • Part of subcall function 00AC122D: FreeLibrary.KERNEL32(?), ref: 00AC12F5
                          • Part of subcall function 00AC122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00AC1318
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00AC12E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                        • String ID:
                        • API String ID: 395352322-0
                        • Opcode ID: e981a109c48ac7079649cdcfd6585fa0dfab41d1eed720ff6e2ae88818c7b4ad
                        • Instruction ID: b9b769244a1ea3cebeeec6609ab936cd86a0d3b625fad21fb2ab714356b45052
                        • Opcode Fuzzy Hash: e981a109c48ac7079649cdcfd6585fa0dfab41d1eed720ff6e2ae88818c7b4ad
                        • Instruction Fuzzy Hash: BA314BB1A01109BFDB14DBD0DC89EFEBBBCEF09304F014179E511E6242EA749E459AA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00AC655B
                        • GetWindowLongW.USER32(01535720,000000F0), ref: 00AC658E
                        • GetWindowLongW.USER32(01535720,000000F0), ref: 00AC65C3
                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00AC65F5
                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00AC661F
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00AC6630
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00AC664A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: 39a5ffb47279fb37ac00caaff19d56954cc90da95247d9866056235f0d197294
                        • Instruction ID: 81a7c1ad6aed7287735a2b15811908f894a2b21e2a694b313f5155f8d3c5e56e
                        • Opcode Fuzzy Hash: 39a5ffb47279fb37ac00caaff19d56954cc90da95247d9866056235f0d197294
                        • Instruction Fuzzy Hash: 33311130604259AFDB20CF68DC84F653BE2FB5A314F2A41A9F5119B2B6CB71AC51DB41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00AB80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00AB80CB
                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00AB64D9
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB64E8
                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00AB6521
                        • connect.WSOCK32(00000000,?,00000010), ref: 00AB652A
                        • WSAGetLastError.WSOCK32 ref: 00AB6534
                        • closesocket.WSOCK32(00000000), ref: 00AB655D
                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00AB6576
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                        • String ID:
                        • API String ID: 910771015-0
                        • Opcode ID: d808308306dec25120919bdae36ab4246a06be558ba6e6ebff0a2a7732804b6a
                        • Instruction ID: dd9602fc771d77c9987b43e7c370a7c334af3e00e9465b2bfc2a9c77397c2de4
                        • Opcode Fuzzy Hash: d808308306dec25120919bdae36ab4246a06be558ba6e6ebff0a2a7732804b6a
                        • Instruction Fuzzy Hash: 09319E31600218AFDB10AF64CD85FBA7BADEB44750F048169F90997292CB78AD15CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A9E0FA
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A9E120
                        • SysAllocString.OLEAUT32(00000000), ref: 00A9E123
                        • SysAllocString.OLEAUT32 ref: 00A9E144
                        • SysFreeString.OLEAUT32 ref: 00A9E14D
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00A9E167
                        • SysAllocString.OLEAUT32(?), ref: 00A9E175
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 9ee5a3138719c4964e965c079530df2a1b0f77e577e192f660aa502c946be89c
                        • Instruction ID: 3196dc835c819249ba384a7bdc17bde4136dbb78a8e9517dda336befc0ae2b42
                        • Opcode Fuzzy Hash: 9ee5a3138719c4964e965c079530df2a1b0f77e577e192f660aa502c946be89c
                        • Instruction Fuzzy Hash: 8C216035704208AFDF10DFA8DC88DAB77EDEB19760B118225F915CB261DA71DC81CB64
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A41D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A41D73
                          • Part of subcall function 00A41D35: GetStockObject.GDI32(00000011), ref: 00A41D87
                          • Part of subcall function 00A41D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A41D91
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00AC78A1
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00AC78AE
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00AC78B9
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00AC78C8
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00AC78D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: d647e57f8d9529b8a8b663611547961f289f41f6ece51b8de9a21879ab732a3c
                        • Instruction ID: 7e317cbf455231dc67cf729e0cefad65fcaa0caa75940ec993761cffab7aa6bb
                        • Opcode Fuzzy Hash: d647e57f8d9529b8a8b663611547961f289f41f6ece51b8de9a21879ab732a3c
                        • Instruction Fuzzy Hash: D71190B6510219BFEF159F60CC85EEB7F6DEF08758F014114BB04A2090CB729C61DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00A64292,?), ref: 00A641E3
                        • GetProcAddress.KERNEL32(00000000), ref: 00A641EA
                        • EncodePointer.KERNEL32(00000000), ref: 00A641F6
                        • DecodePointer.KERNEL32(00000001,00A64292,?), ref: 00A64213
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                        • String ID: RoInitialize$combase.dll
                        • API String ID: 3489934621-340411864
                        • Opcode ID: d51ef84de7a174c30a8296c145ee7f1e8380dccc61cb0952fb39f5dc228e02da
                        • Instruction ID: 7553f0c8086692319d95e216a059d7fc3912c9e5fecb446e57f7e52fd40d8956
                        • Opcode Fuzzy Hash: d51ef84de7a174c30a8296c145ee7f1e8380dccc61cb0952fb39f5dc228e02da
                        • Instruction Fuzzy Hash: EFE012F4590340AEEB10ABB0EC09F443DA6B775B02F114425B661E61A0DBB54096CF00
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00A641B8), ref: 00A642B8
                        • GetProcAddress.KERNEL32(00000000), ref: 00A642BF
                        • EncodePointer.KERNEL32(00000000), ref: 00A642CA
                        • DecodePointer.KERNEL32(00A641B8), ref: 00A642E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                        • String ID: RoUninitialize$combase.dll
                        • API String ID: 3489934621-2819208100
                        • Opcode ID: 84a04c9f1a0022a76decb7bae8d5528aa4a62199b5946960561943d0db448acb
                        • Instruction ID: 0abb7123651a63fdd1b318776769775f9db0e0445329aa1c09ec9a75cacd06b5
                        • Opcode Fuzzy Hash: 84a04c9f1a0022a76decb7bae8d5528aa4a62199b5946960561943d0db448acb
                        • Instruction Fuzzy Hash: FCE092BC581300AFEB109BA1EE09F453EA6B738742F214426F252E62A0CBB44545CB14
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memmove$__itow__swprintf
                        • String ID:
                        • API String ID: 3253778849-0
                        • Opcode ID: 9878d26070b011936cad77e1676243b9e2a31e5d9705435f175891a5af6f413f
                        • Instruction ID: dd9df7eb4a72c9e7b23ec23bced5c5dfe8ed6580ffa51abe573b5d4c4ac547d8
                        • Opcode Fuzzy Hash: 9878d26070b011936cad77e1676243b9e2a31e5d9705435f175891a5af6f413f
                        • Instruction Fuzzy Hash: D761AD3450469A9BCF11EF60CE81EFF7BA8AF89308F094519F8565B2D2DB349951CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00AC10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AC0038,?,?), ref: 00AC10BC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AC0548
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00AC0588
                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00AC05AB
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00AC05D4
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00AC0617
                        • RegCloseKey.ADVAPI32(00000000), ref: 00AC0624
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                        • String ID:
                        • API String ID: 4046560759-0
                        • Opcode ID: 0ce364f5ec802c361b6819a83866626d352999a068fa920a4c23affb386e15db
                        • Instruction ID: fa1d4c73da9fc2a95b0412c70ea8cd874a3724ba26e8f88aa1ba893e893d88a5
                        • Opcode Fuzzy Hash: 0ce364f5ec802c361b6819a83866626d352999a068fa920a4c23affb386e15db
                        • Instruction Fuzzy Hash: A3514335208240EFCB14EF64C985E6BBBE9FF89714F04892DF485972A2DB71E905CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetMenu.USER32(?), ref: 00AC5A82
                        • GetMenuItemCount.USER32(00000000), ref: 00AC5AB9
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00AC5AE1
                        • GetMenuItemID.USER32(?,?), ref: 00AC5B50
                        • GetSubMenu.USER32(?,?), ref: 00AC5B5E
                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 00AC5BAF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Menu$Item$CountMessagePostString
                        • String ID:
                        • API String ID: 650687236-0
                        • Opcode ID: f61d7724688ec1a95500987a7c20dde04b63dc5698af5edc8265822dd66eb8c1
                        • Instruction ID: 0dfa984c4bd514df9dad7efd2fe37d3b5f7c98eff07fa4da4a88f3b755dbf05c
                        • Opcode Fuzzy Hash: f61d7724688ec1a95500987a7c20dde04b63dc5698af5edc8265822dd66eb8c1
                        • Instruction Fuzzy Hash: 47516B35E00615AFCF15EFA5C945EAEBBB5EF48310F154469F802AB351DB70BE818B90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00A9F3F7
                        • VariantClear.OLEAUT32(00000013), ref: 00A9F469
                        • VariantClear.OLEAUT32(00000000), ref: 00A9F4C4
                        • _memmove.LIBCMT ref: 00A9F4EE
                        • VariantClear.OLEAUT32(?), ref: 00A9F53B
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A9F569
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType_memmove
                        • String ID:
                        • API String ID: 1101466143-0
                        • Opcode ID: 547c5fff6b8c9df4e2cba475d23e01b3fe3e6298469b0e7f020a3c72ba0a47f9
                        • Instruction ID: 083b8a31de528e77b7fb94987e3c37e72904da918584df57580aa72b6f564450
                        • Opcode Fuzzy Hash: 547c5fff6b8c9df4e2cba475d23e01b3fe3e6298469b0e7f020a3c72ba0a47f9
                        • Instruction Fuzzy Hash: 15513AB5A00209DFCF14CF58D884AAAB7F9FF48354B158569ED59DB310D730E911CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AA2747
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AA2792
                        • IsMenu.USER32(00000000), ref: 00AA27B2
                        • CreatePopupMenu.USER32 ref: 00AA27E6
                        • GetMenuItemCount.USER32(000000FF), ref: 00AA2844
                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00AA2875
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                        • String ID:
                        • API String ID: 3311875123-0
                        • Opcode ID: 937da1a84fda7d634e9734a5c7d9faef6230fc26736101c0e09926f3b12ce698
                        • Instruction ID: 9a421bff4ccda33af00fce75ed27b3255db23a31c007cd33985e36c05ba46791
                        • Opcode Fuzzy Hash: 937da1a84fda7d634e9734a5c7d9faef6230fc26736101c0e09926f3b12ce698
                        • Instruction Fuzzy Hash: 6C519E70A00209EFDF25CF6CC988BAEBBF5AF4A314F104169F8119B2D0D7748924CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 00A4179A
                        • GetWindowRect.USER32(?,?), ref: 00A417FE
                        • ScreenToClient.USER32(?,?), ref: 00A4181B
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00A4182C
                        • EndPaint.USER32(?,?), ref: 00A41876
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                        • String ID:
                        • API String ID: 1827037458-0
                        • Opcode ID: e0041061732587ccf4b18aaae38c4024e92c5e615f5fbdcb02aa9bd8acb73bae
                        • Instruction ID: da85b810a8eee320230bdd673ae28b17a88b8a6c9e3aa59f6c841fce8453cc8b
                        • Opcode Fuzzy Hash: e0041061732587ccf4b18aaae38c4024e92c5e615f5fbdcb02aa9bd8acb73bae
                        • Instruction Fuzzy Hash: 8041CF74200301AFD710DF24CC84FBB7BF9EB99724F048629F994872A1CB319885DB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ShowWindow.USER32(00B067B0,00000000,01535720,?,?,00B067B0,?,00ACB862,?,?), ref: 00ACB9CC
                        • EnableWindow.USER32(00000000,00000000), ref: 00ACB9F0
                        • ShowWindow.USER32(00B067B0,00000000,01535720,?,?,00B067B0,?,00ACB862,?,?), ref: 00ACBA50
                        • ShowWindow.USER32(00000000,00000004,?,00ACB862,?,?), ref: 00ACBA62
                        • EnableWindow.USER32(00000000,00000001), ref: 00ACBA86
                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00ACBAA9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: 0357a20c9f3aefd533667d351859aaf002d40d17ccfc5eaf8d5f011cf83bcab3
                        • Instruction ID: b876daa7a492a64cb043162c428110f5eed307d59948c8c1c4ed2b2e84121d4d
                        • Opcode Fuzzy Hash: 0357a20c9f3aefd533667d351859aaf002d40d17ccfc5eaf8d5f011cf83bcab3
                        • Instruction Fuzzy Hash: BB416230610241AFDB25CF54C88AF957BE1FF05350F1A41BDEA489F2A2C733A846CB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00AB5134,?,?,00000000,00000001), ref: 00AB73BF
                          • Part of subcall function 00AB3C94: GetWindowRect.USER32(?,?), ref: 00AB3CA7
                        • GetDesktopWindow.USER32 ref: 00AB73E9
                        • GetWindowRect.USER32(00000000), ref: 00AB73F0
                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00AB7422
                          • Part of subcall function 00AA54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AA555E
                        • GetCursorPos.USER32(?), ref: 00AB744E
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00AB74AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                        • String ID:
                        • API String ID: 4137160315-0
                        • Opcode ID: 945bd1bb05b3134084324501366d0f41276180baf5fe4ed0fb9e619fc64a1948
                        • Instruction ID: 6d12985ffb58f64e09286c2ca9c594637eb6b3c4767f47742725a999559db261
                        • Opcode Fuzzy Hash: 945bd1bb05b3134084324501366d0f41276180baf5fe4ed0fb9e619fc64a1948
                        • Instruction Fuzzy Hash: 4A31B272508315AFD720DF54D849E9FBBAAFF89314F000929F58997192DB70EA09CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A985F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A98608
                          • Part of subcall function 00A985F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A98612
                          • Part of subcall function 00A985F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A98621
                          • Part of subcall function 00A985F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A98628
                          • Part of subcall function 00A985F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A9863E
                        • GetLengthSid.ADVAPI32(?,00000000,00A98977), ref: 00A98DAC
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A98DB8
                        • HeapAlloc.KERNEL32(00000000), ref: 00A98DBF
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A98DD8
                        • GetProcessHeap.KERNEL32(00000000,00000000,00A98977), ref: 00A98DEC
                        • HeapFree.KERNEL32(00000000), ref: 00A98DF3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: 77c17b7b317181e268eac0dfca73550d69126b8f9936980e72ae4e0f3e76c8e4
                        • Instruction ID: 24116e1115c335e222b143ff1f5a99e2cb7df0c8c07bf1eacc77fc48af38a37e
                        • Opcode Fuzzy Hash: 77c17b7b317181e268eac0dfca73550d69126b8f9936980e72ae4e0f3e76c8e4
                        • Instruction Fuzzy Hash: AD11EB32602604FFDF10CFA4CC08FAE7BBAEF42315F14412AE84993251DB3AA901CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A98B2A
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00A98B31
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A98B40
                        • CloseHandle.KERNEL32(00000004), ref: 00A98B4B
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A98B7A
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A98B8E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: 6ae6fa4a39cf181aa328f3d0a7969b7b781764a818d6d525dc2e842f339eae6c
                        • Instruction ID: 54cb98cda1fdb2c710f4e95f667589d6491c74c516870f5785c17f79966bd97c
                        • Opcode Fuzzy Hash: 6ae6fa4a39cf181aa328f3d0a7969b7b781764a818d6d525dc2e842f339eae6c
                        • Instruction Fuzzy Hash: 32114AB2600209AFDF01CFA4DD49FDE7BA9EF09304F094065FE04A6160C6768D619B60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A412F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A4134D
                          • Part of subcall function 00A412F3: SelectObject.GDI32(?,00000000), ref: 00A4135C
                          • Part of subcall function 00A412F3: BeginPath.GDI32(?), ref: 00A41373
                          • Part of subcall function 00A412F3: SelectObject.GDI32(?,00000000), ref: 00A4139C
                        • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00ACC1C4
                        • LineTo.GDI32(00000000,00000003,?), ref: 00ACC1D8
                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00ACC1E6
                        • LineTo.GDI32(00000000,00000000,?), ref: 00ACC1F6
                        • EndPath.GDI32(00000000), ref: 00ACC206
                        • StrokePath.GDI32(00000000), ref: 00ACC216
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                        • String ID:
                        • API String ID: 43455801-0
                        • Opcode ID: 7b198121c1c34e8dbcd1362365753b505d47f7af6ba5fc28004d8730c0d1ca1d
                        • Instruction ID: 54c0a50058631afac2a5f3f570bd016f7aedf3c028965ed3a0139c5b7080cc62
                        • Opcode Fuzzy Hash: 7b198121c1c34e8dbcd1362365753b505d47f7af6ba5fc28004d8730c0d1ca1d
                        • Instruction Fuzzy Hash: C511097640010CBFDB119F90DC88FEA7FADEB08364F058025FA189A161D7719D55DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A603D3
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00A603DB
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A603E6
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A603F1
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00A603F9
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A60401
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: 03dbff51c1be348145e3c1f8cb721217d213fdbbee5a82cca56bb2963564b68e
                        • Instruction ID: 56af3ea0737e4e6754854b9caf2b69addf8b11548b2430505cc4c168657cc1cc
                        • Opcode Fuzzy Hash: 03dbff51c1be348145e3c1f8cb721217d213fdbbee5a82cca56bb2963564b68e
                        • Instruction Fuzzy Hash: 87016CB09017597DE3008F5A8C85B52FFE8FF19354F00411BA15C47941C7F5A864CBE5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00AA569B
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00AA56B1
                        • GetWindowThreadProcessId.USER32(?,?), ref: 00AA56C0
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AA56CF
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AA56D9
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AA56E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: 19c41daee8ceb62538de8bbbb4f062e016f1233a885a13df1ab5b69ba872ee10
                        • Instruction ID: 62244e107906b339da5243a0284ab9d22a929ea1e5121a1edf257436a4676c86
                        • Opcode Fuzzy Hash: 19c41daee8ceb62538de8bbbb4f062e016f1233a885a13df1ab5b69ba872ee10
                        • Instruction Fuzzy Hash: 43F03032641558BFE7219BE2DC0DEEF7B7DEFC6B11F050169FA04D1090D7A11A0286B5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InterlockedExchange.KERNEL32(?,?), ref: 00AA74E5
                        • EnterCriticalSection.KERNEL32(?,?,00A51044,?,?), ref: 00AA74F6
                        • TerminateThread.KERNEL32(00000000,000001F6,?,00A51044,?,?), ref: 00AA7503
                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00A51044,?,?), ref: 00AA7510
                          • Part of subcall function 00AA6ED7: CloseHandle.KERNEL32(00000000,?,00AA751D,?,00A51044,?,?), ref: 00AA6EE1
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AA7523
                        • LeaveCriticalSection.KERNEL32(?,?,00A51044,?,?), ref: 00AA752A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: 63935a77fd89e6c9254e1ec3fd9af9493c12ef4769d9e36f253ed3546ae6245b
                        • Instruction ID: 0407d146525778fad73b9d461c596f347dec4b0b303dce5dd5bf2f6e58f6ad90
                        • Opcode Fuzzy Hash: 63935a77fd89e6c9254e1ec3fd9af9493c12ef4769d9e36f253ed3546ae6245b
                        • Instruction Fuzzy Hash: 1BF03A7A540612EFDB125BA4ED88DEB772AEF45702B060532F202910A0CB755802CA50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A98E7F
                        • UnloadUserProfile.USERENV(?,?), ref: 00A98E8B
                        • CloseHandle.KERNEL32(?), ref: 00A98E94
                        • CloseHandle.KERNEL32(?), ref: 00A98E9C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00A98EA5
                        • HeapFree.KERNEL32(00000000), ref: 00A98EAC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: 5f0720ee423c824d14744904acba8f434890dba3de533a07ecc146d3f21cd2ac
                        • Instruction ID: 2583cdc89f3f9e9d46e41263176b1abc436c4438e12cd6d4ea80ce8068961111
                        • Opcode Fuzzy Hash: 5f0720ee423c824d14744904acba8f434890dba3de533a07ecc146d3f21cd2ac
                        • Instruction Fuzzy Hash: 05E0C236004401FFDA019FE2EC0CD0ABB6AFB89322B168232F32985170CB329422DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00AB8928
                        • CharUpperBuffW.USER32(?,?), ref: 00AB8A37
                        • VariantClear.OLEAUT32(?), ref: 00AB8BAF
                          • Part of subcall function 00AA7804: VariantInit.OLEAUT32(00000000), ref: 00AA7844
                          • Part of subcall function 00AA7804: VariantCopy.OLEAUT32(00000000,?), ref: 00AA784D
                          • Part of subcall function 00AA7804: VariantClear.OLEAUT32(00000000), ref: 00AA7859
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4237274167-1221869570
                        • Opcode ID: 5e8f9c481cce2978d179e66c4cf34f2b15f52614ea09b53f0f206350ce422d31
                        • Instruction ID: 6c8d9812eb0d08766fd2f66bc556b40480b5feb9066f1f5586c441e6b8ddaa85
                        • Opcode Fuzzy Hash: 5e8f9c481cce2978d179e66c4cf34f2b15f52614ea09b53f0f206350ce422d31
                        • Instruction Fuzzy Hash: 71916D756043019FCB10DF28C58499BBBF8EF89754F04896EF89A8B362DB30E945CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A5FEC6: _wcscpy.LIBCMT ref: 00A5FEE9
                        • _memset.LIBCMT ref: 00AA3077
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AA30A6
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AA3159
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00AA3187
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                        • String ID: 0
                        • API String ID: 4152858687-4108050209
                        • Opcode ID: 55a0e91ccc03fe44d7ca5409170dcdadc454a390682c7c16a8f2d946861f1ef4
                        • Instruction ID: 7e141e483d268b6031340deaa629f7ebeaa2f00f8bf7b6f6b9a6d116579e9440
                        • Opcode Fuzzy Hash: 55a0e91ccc03fe44d7ca5409170dcdadc454a390682c7c16a8f2d946861f1ef4
                        • Instruction Fuzzy Hash: F851BE726083009FDF259F28D945A6BBBE4EF96320F044A2EF895D71E1DB71CE448792
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A9DAC5
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A9DAFB
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A9DB0C
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A9DB8E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: DllGetClassObject
                        • API String ID: 753597075-1075368562
                        • Opcode ID: 65b499a51498426fd9fa3a39e0bdbb0adea0c843972701e2de3f54e5daccc71a
                        • Instruction ID: b9b2c5305490a347c0cc85fb958301e54bab4d8f82619a6f074034ab8f625d89
                        • Opcode Fuzzy Hash: 65b499a51498426fd9fa3a39e0bdbb0adea0c843972701e2de3f54e5daccc71a
                        • Instruction Fuzzy Hash: FC416FB1700208EFDF15CF65C984AAA7BF9EF44350F1685AAAD059F205D7B1DD84CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AA2CAF
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00AA2CCB
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00AA2D11
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B06890,00000000), ref: 00AA2D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem_memset
                        • String ID: 0
                        • API String ID: 1173514356-4108050209
                        • Opcode ID: 242edce209fc415cea7320e8fc998e8e8553c0827cc8df8bb683f55ddd3e08f4
                        • Instruction ID: 1542fe952f4132e1c829d4ad69d42bb40fa83f93b6daf6764a57a55d5880b6fb
                        • Opcode Fuzzy Hash: 242edce209fc415cea7320e8fc998e8e8553c0827cc8df8bb683f55ddd3e08f4
                        • Instruction Fuzzy Hash: 7541BF302043029FD720DF28C945B6ABBE8EF86320F14462DF966972E2D770E915CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00ABDAD9
                          • Part of subcall function 00A479AB: _memmove.LIBCMT ref: 00A479F9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharLower_memmove
                        • String ID: cdecl$none$stdcall$winapi
                        • API String ID: 3425801089-567219261
                        • Opcode ID: 3f1502fbde5b1e2d70649792d3e32810d7b850277f303c66b56465fe86beb034
                        • Instruction ID: 802bde7205da9d871e34db41a2161ff2553073f9d92c72d64b629c1bd3406d6b
                        • Opcode Fuzzy Hash: 3f1502fbde5b1e2d70649792d3e32810d7b850277f303c66b56465fe86beb034
                        • Instruction Fuzzy Hash: 2B31B275500619EFCF00EF94CD819FEB7B8FF45310B108A29E965A76D2DB71A906CB80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00A9B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A9B0E7
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A993F6
                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A99409
                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A99439
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$_memmove$ClassName
                        • String ID: ComboBox$ListBox
                        • API String ID: 365058703-1403004172
                        • Opcode ID: 21461bf8f2eebb6df94dfd9917d6290777a7e0f89021b739c1f7fedd8d419c82
                        • Instruction ID: 0bf9906590bbb2725c15fa62e322cb577209b6e3bd5fc06cc0520068faade94e
                        • Opcode Fuzzy Hash: 21461bf8f2eebb6df94dfd9917d6290777a7e0f89021b739c1f7fedd8d419c82
                        • Instruction Fuzzy Hash: 7C21E175A00108BFDF14ABB4DD85DFFB7B8DF85360B14812DF925972E1DB350A0A9A20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00AB1B40
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00AB1B66
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00AB1B96
                        • InternetCloseHandle.WININET(00000000), ref: 00AB1BDD
                          • Part of subcall function 00AB2777: GetLastError.KERNEL32(?,?,00AB1B0B,00000000,00000000,00000001), ref: 00AB278C
                          • Part of subcall function 00AB2777: SetEvent.KERNEL32(?,?,00AB1B0B,00000000,00000000,00000001), ref: 00AB27A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: ee0a56fe978badc51439a239396df99f9f7ea7974884929c893b70fcb1474b80
                        • Instruction ID: c2a4b59f6a9b25d18be5d6364ad1a40dac7eb63e686821fbf3887d200ecf8893
                        • Opcode Fuzzy Hash: ee0a56fe978badc51439a239396df99f9f7ea7974884929c893b70fcb1474b80
                        • Instruction Fuzzy Hash: EF219DB2600208BFEB11DF609C95EFF76FDEB49744F10452AF505A6241EA249E0697A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A41D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A41D73
                          • Part of subcall function 00A41D35: GetStockObject.GDI32(00000011), ref: 00A41D87
                          • Part of subcall function 00A41D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A41D91
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00AC66D0
                        • LoadLibraryW.KERNEL32(?), ref: 00AC66D7
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00AC66EC
                        • DestroyWindow.USER32(?), ref: 00AC66F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                        • String ID: SysAnimate32
                        • API String ID: 4146253029-1011021900
                        • Opcode ID: e13b599bae2abd52c30842953cdf1b27fda386d00632dfd171b10a7e4edbc157
                        • Instruction ID: 09aa8cd368789ec663db91ae9e82d885c13b916b4c0196d65eaf682fa5c14552
                        • Opcode Fuzzy Hash: e13b599bae2abd52c30842953cdf1b27fda386d00632dfd171b10a7e4edbc157
                        • Instruction Fuzzy Hash: 05218B71200206AFEF148FA4EC80FBB37ADEF59368F124A2DFA1092190D771CC519761
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 00AA705E
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AA7091
                        • GetStdHandle.KERNEL32(0000000C), ref: 00AA70A3
                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00AA70DD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateHandle$FilePipe
                        • String ID: nul
                        • API String ID: 4209266947-2873401336
                        • Opcode ID: 35bfc63d53dbf0018d4d3dc735fbd50c5258343378a2bb5e84b9c86e36b8d21c
                        • Instruction ID: 6e745d7e9899f70805d86d59f99de0d536f6cdc5b79ef5b477153db59221336a
                        • Opcode Fuzzy Hash: 35bfc63d53dbf0018d4d3dc735fbd50c5258343378a2bb5e84b9c86e36b8d21c
                        • Instruction Fuzzy Hash: 0A215E74604209AFDB209F69DC05A9FBBB8BF56721F204A29FDA1D72D0E77098518B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00AA712B
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AA715D
                        • GetStdHandle.KERNEL32(000000F6), ref: 00AA716E
                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00AA71A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateHandle$FilePipe
                        • String ID: nul
                        • API String ID: 4209266947-2873401336
                        • Opcode ID: 527f699df8b1223fd4fc813529404fd946048ff3828fcd379ea405f086dcdbb2
                        • Instruction ID: d059fd5e51ba467d6f5e9f009298236832647568de8e1763e7248268dce6fd5a
                        • Opcode Fuzzy Hash: 527f699df8b1223fd4fc813529404fd946048ff3828fcd379ea405f086dcdbb2
                        • Instruction Fuzzy Hash: 80215375604215AFDB209F69DC44EAFB7E8AF56720F200B19FDA1D72E0EB709841CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00AAAEBF
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00AAAF13
                        • __swprintf.LIBCMT ref: 00AAAF2C
                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,00ACF910), ref: 00AAAF6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume__swprintf
                        • String ID: %lu
                        • API String ID: 3164766367-685833217
                        • Opcode ID: 7c6098eb5b79d8f9897a20e3b1422f2738357af312461aafbdc4f3a2622fa228
                        • Instruction ID: 79dbff69ef36614b8b5853b1a92e33ed88777447eb15215360332df05b03d612
                        • Opcode Fuzzy Hash: 7c6098eb5b79d8f9897a20e3b1422f2738357af312461aafbdc4f3a2622fa228
                        • Instruction Fuzzy Hash: 58213035A00109AFDB10DFA5C985DAEBBF9EF89704B104069F909EB251DB71EA42CB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                          • Part of subcall function 00A9A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A9A399
                          • Part of subcall function 00A9A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A9A3AC
                          • Part of subcall function 00A9A37C: GetCurrentThreadId.KERNEL32 ref: 00A9A3B3
                          • Part of subcall function 00A9A37C: AttachThreadInput.USER32(00000000), ref: 00A9A3BA
                        • GetFocus.USER32 ref: 00A9A554
                          • Part of subcall function 00A9A3C5: GetParent.USER32(?), ref: 00A9A3D3
                        • GetClassNameW.USER32(?,?,00000100), ref: 00A9A59D
                        • EnumChildWindows.USER32(?,00A9A615), ref: 00A9A5C5
                        • __swprintf.LIBCMT ref: 00A9A5DF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                        • String ID: %s%d
                        • API String ID: 1941087503-1110647743
                        • Opcode ID: da5cfab08e1bbbc1ece6d113e92858a12400634ffa906d97b6ccc0a99f7ab0ea
                        • Instruction ID: cb482e79023cae3c240786e28a05d72fdc97ea7ca38032ef29155a4036338359
                        • Opcode Fuzzy Hash: da5cfab08e1bbbc1ece6d113e92858a12400634ffa906d97b6ccc0a99f7ab0ea
                        • Instruction Fuzzy Hash: 01117F79700209BBDF11BFB4DD85FEA37B9AF58700F04407ABA08AA152CB7059469BB5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00AA2048
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                        • API String ID: 3964851224-769500911
                        • Opcode ID: 089be60a38411f3ec495113698b2a86f07ffa5deaebbebe30ca687c62e9989c4
                        • Instruction ID: 383c310205b131a2938a5f23cdf05dc08d11f8c40e256b6c6a68d979169db23c
                        • Opcode Fuzzy Hash: 089be60a38411f3ec495113698b2a86f07ffa5deaebbebe30ca687c62e9989c4
                        • Instruction Fuzzy Hash: 1B115B74940109DFCF00EFA8D9419FEB7B4FF26304B108669E965A7292EB336D1ACB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00ABEF1B
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00ABEF4B
                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00ABF07E
                        • CloseHandle.KERNEL32(?), ref: 00ABF0FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                        • String ID:
                        • API String ID: 2364364464-0
                        • Opcode ID: f8e39d31174a11a9784af4b4e07fd2394b3a4453c9e1a5f1bd641f59a98166a8
                        • Instruction ID: 34b735eb1249f434af9d23f7d23a4475a94fe18b45017e944848321cba20f5fd
                        • Opcode Fuzzy Hash: f8e39d31174a11a9784af4b4e07fd2394b3a4453c9e1a5f1bd641f59a98166a8
                        • Instruction Fuzzy Hash: 2C814E756043019FD720EF28D986B6BB7E5AF88710F14882DF5999B392DBB0AC418B51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00AC10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AC0038,?,?), ref: 00AC10BC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AC0388
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00AC03C7
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00AC040E
                        • RegCloseKey.ADVAPI32(?,?), ref: 00AC043A
                        • RegCloseKey.ADVAPI32(00000000), ref: 00AC0447
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                        • String ID:
                        • API String ID: 3440857362-0
                        • Opcode ID: 435ca8f451981b225edc42c624c968aaa5c31e634687261a3be94af70ca6ae97
                        • Instruction ID: 41b3f148c1cad57e6e558628dc8b90686146d583a9ab985f1d747a843158538d
                        • Opcode Fuzzy Hash: 435ca8f451981b225edc42c624c968aaa5c31e634687261a3be94af70ca6ae97
                        • Instruction Fuzzy Hash: 0C514831208244EFDB04EB64C985F6FB7E9FF88704F44892DB5959B2A2DB30E905CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00ABDC3B
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00ABDCBE
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00ABDCDA
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00ABDD1B
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00ABDD35
                          • Part of subcall function 00A45B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AA7B20,?,?,00000000), ref: 00A45B8C
                          • Part of subcall function 00A45B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AA7B20,?,?,00000000,?,?), ref: 00A45BB0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                        • String ID:
                        • API String ID: 327935632-0
                        • Opcode ID: ccbddd9da9577eabdd7a629f47c0b7cc1148d6ac7cb7059f172ad7fbd4f426cb
                        • Instruction ID: 81a18038e5f559e84b29d2b07d8a94b190181f991bf2b2aa8e3f54b87b452713
                        • Opcode Fuzzy Hash: ccbddd9da9577eabdd7a629f47c0b7cc1148d6ac7cb7059f172ad7fbd4f426cb
                        • Instruction Fuzzy Hash: 38512B79A00605DFCB00EFA8C584DAEBBF9FF49310B058069E955AB312D731AD45CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00AAE88A
                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00AAE8B3
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00AAE8F2
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00AAE917
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00AAE91F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                        • String ID:
                        • API String ID: 1389676194-0
                        • Opcode ID: b9711a842ae4d014aec80f32f31559e21623b8060443094c48e250f9726ffddf
                        • Instruction ID: 0bb8caa7fb53f12526fd25230261c4f7765500ab806c4c3cd675a244416e97d7
                        • Opcode Fuzzy Hash: b9711a842ae4d014aec80f32f31559e21623b8060443094c48e250f9726ffddf
                        • Instruction Fuzzy Hash: E151FC39A00205DFCF05EF64CA819AEBBF5EF49314B1480A9E849AB362DB31ED51DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 56b5f953400e26a5edb027c1c6e6f84960df897e021b6626647a02e9c4c3edae
                        • Instruction ID: baf7e91281bcd7914ef396334db7ee1a83fc410abac23bdaedc4425fbae88330
                        • Opcode Fuzzy Hash: 56b5f953400e26a5edb027c1c6e6f84960df897e021b6626647a02e9c4c3edae
                        • Instruction Fuzzy Hash: C641263990024CAFCB10DF68CC58FB9BBA5EB19314F064169F916AB3E0C7309D41DA51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCursorPos.USER32(?), ref: 00A42357
                        • ScreenToClient.USER32(00B067B0,?), ref: 00A42374
                        • GetAsyncKeyState.USER32(00000001), ref: 00A42399
                        • GetAsyncKeyState.USER32(00000002), ref: 00A423A7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID:
                        • API String ID: 4210589936-0
                        • Opcode ID: 0035c9b4e7ce1df19e1bd9c902fa96b2d770ece5095cc89d499287d7ee031e65
                        • Instruction ID: 05b72933d9e61c1b9b671b46f67140b5c5adc3ecea59d7656ebd1270da05619a
                        • Opcode Fuzzy Hash: 0035c9b4e7ce1df19e1bd9c902fa96b2d770ece5095cc89d499287d7ee031e65
                        • Instruction Fuzzy Hash: 99417E35604119FFDF159FA8CC44FE9BB75FB45320F60836AF8289A2A1C734A990DB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A9695D
                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00A969A9
                        • TranslateMessage.USER32(?), ref: 00A969D2
                        • DispatchMessageW.USER32(?), ref: 00A969DC
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A969EB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Message$PeekTranslate$AcceleratorDispatch
                        • String ID:
                        • API String ID: 2108273632-0
                        • Opcode ID: e8967905e890aafc1557d50c6a2640a427cc4d6fc7ab9ed506a6856f21637779
                        • Instruction ID: 0973d9aa5aca863082622d8383df7461d1690248e16daf9bbb835e123e20404e
                        • Opcode Fuzzy Hash: e8967905e890aafc1557d50c6a2640a427cc4d6fc7ab9ed506a6856f21637779
                        • Instruction Fuzzy Hash: 0D31CF31A01246AEDF20CFB48C84FB6BBFCAF11344F104569E422D71A1EB34D896DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00A98F12
                        • PostMessageW.USER32(?,00000201,00000001), ref: 00A98FBC
                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00A98FC4
                        • PostMessageW.USER32(?,00000202,00000000), ref: 00A98FD2
                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00A98FDA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: df1f3b774d91575e149ff3ec9e651dfd2b6ebac9fd507d9c67c657591d1eab08
                        • Instruction ID: a1d45223bb37d23c365d9ae213fea2d947301ca3e610f0f98f4102d81fac1205
                        • Opcode Fuzzy Hash: df1f3b774d91575e149ff3ec9e651dfd2b6ebac9fd507d9c67c657591d1eab08
                        • Instruction Fuzzy Hash: F631CE71600219EFDF14CFA8D94CAAE7BB6EB05315F114229F925EA2D0C7B89A14DB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • IsWindowVisible.USER32(?), ref: 00A9B6C7
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A9B6E4
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A9B71C
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A9B742
                        • _wcsstr.LIBCMT ref: 00A9B74C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                        • String ID:
                        • API String ID: 3902887630-0
                        • Opcode ID: b9529d373c4ede86ac38521716cde17b06cb2a984e6ec11b1a7a387954d01295
                        • Instruction ID: 971d2316e147e23df5a9abb1e34c613e5bf98d045a03fd477c5e499240ed0ddd
                        • Opcode Fuzzy Hash: b9529d373c4ede86ac38521716cde17b06cb2a984e6ec11b1a7a387954d01295
                        • Instruction Fuzzy Hash: 87213732305244BBEF249BB9AE49E7B7BE9DF85710F014039F805CA1A1EF61DC4183A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • GetWindowLongW.USER32(?,000000F0), ref: 00ACB44C
                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00ACB471
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00ACB489
                        • GetSystemMetrics.USER32(00000004), ref: 00ACB4B2
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00AB1184,00000000), ref: 00ACB4D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$Long$MetricsSystem
                        • String ID:
                        • API String ID: 2294984445-0
                        • Opcode ID: 3809696283416bd35539f5024a288e23f0dfdb6737caefd683a5c71eaddc949a
                        • Instruction ID: 93ae7136c121f630963053264bb9d425cad5a2bd54bb0316dd82cf8bbc6b413c
                        • Opcode Fuzzy Hash: 3809696283416bd35539f5024a288e23f0dfdb6737caefd683a5c71eaddc949a
                        • Instruction Fuzzy Hash: C021B131928215AFCB188F78CD05F6A3BA4EB04720F128739F926C71E1E7319811DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A99802
                          • Part of subcall function 00A47D2C: _memmove.LIBCMT ref: 00A47D66
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A99834
                        • __itow.LIBCMT ref: 00A9984C
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A99874
                        • __itow.LIBCMT ref: 00A99885
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$__itow$_memmove
                        • String ID:
                        • API String ID: 2983881199-0
                        • Opcode ID: fa454b8ad7ad771733a0e2e882a0ac914f0224cc05b1e7b30a9e732dfd6f3660
                        • Instruction ID: 89676ba0b38f5a09c1234304d6cbfc189a86126f13ef8903b08305276101dafc
                        • Opcode Fuzzy Hash: fa454b8ad7ad771733a0e2e882a0ac914f0224cc05b1e7b30a9e732dfd6f3660
                        • Instruction Fuzzy Hash: 2221B075B00248BBDF10ABA98D8AEEF7BE9EF4A710F04802DF9049B291D7708D459791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A4134D
                        • SelectObject.GDI32(?,00000000), ref: 00A4135C
                        • BeginPath.GDI32(?), ref: 00A41373
                        • SelectObject.GDI32(?,00000000), ref: 00A4139C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: 726b0248b7ea7a98357a2d3d802c4968ed257f39c32b1cee83090e32f6bd7645
                        • Instruction ID: d55c15b9cce6a00bd7c027aeddf0c77369ad8d2c55efa9b0401cbfdea222ba12
                        • Opcode Fuzzy Hash: 726b0248b7ea7a98357a2d3d802c4968ed257f39c32b1cee83090e32f6bd7645
                        • Instruction Fuzzy Hash: FE214F74900308EFDB11DF65EC08BA97BF9FB60761F14C226F8149B1A0DB71A9A1DB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: cb8f3ab984662aaa18d565b6f46f803e94f93936101bd3e3ca28c8b48b2ee9b8
                        • Instruction ID: 5ba283bdd1aa565d1e7cc6f3e0599c182978a14a4d9e192b52f5b80cbd6dffb9
                        • Opcode Fuzzy Hash: cb8f3ab984662aaa18d565b6f46f803e94f93936101bd3e3ca28c8b48b2ee9b8
                        • Instruction Fuzzy Hash: 8D01B9757045057BEA04A6219D42FABB7ECAB213B4F584112FD0597383E690DF11C3F8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00AA4D5C
                        • __beginthreadex.LIBCMT ref: 00AA4D7A
                        • MessageBoxW.USER32(?,?,?,?), ref: 00AA4D8F
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00AA4DA5
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00AA4DAC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                        • String ID:
                        • API String ID: 3824534824-0
                        • Opcode ID: 35ff273f78fd164423ac7d88e24da7ab9250cf9112c3e41a8d7904e7cb808910
                        • Instruction ID: edf4563f10527b63dccc21ff1cddda2ef3de8feee182cf385ad4a414ca1d9697
                        • Opcode Fuzzy Hash: 35ff273f78fd164423ac7d88e24da7ab9250cf9112c3e41a8d7904e7cb808910
                        • Instruction Fuzzy Hash: B6110876904244BFC701DBB89C08EDA7FADEB89320F154369F914D3390D7B58D0487A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A98766
                        • GetLastError.KERNEL32(?,00A9822A,?,?,?), ref: 00A98770
                        • GetProcessHeap.KERNEL32(00000008,?,?,00A9822A,?,?,?), ref: 00A9877F
                        • HeapAlloc.KERNEL32(00000000,?,00A9822A,?,?,?), ref: 00A98786
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A9879D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: 7f5069e71bd99575e8be52300ac7a95fd6883f9c23e8a259b688bf0a01d9d3f0
                        • Instruction ID: 10e4409cec5f8c9ece6c3c944c5da713d61fb874f27ff3592bde27eb10493b53
                        • Opcode Fuzzy Hash: 7f5069e71bd99575e8be52300ac7a95fd6883f9c23e8a259b688bf0a01d9d3f0
                        • Instruction Fuzzy Hash: D8014671200204FFDB208FE6DC88D6B7FAEEF8A355B200529F949C2260DA318C01DA60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AA5502
                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00AA5510
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AA5518
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00AA5522
                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AA555E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: 75432ad939849978f10c6893af99e1012d1877c6cd1ab50c51cdc46d97a61485
                        • Instruction ID: 042bb3b032c97e7c1b7e8b03c205ac08d63ebc8541cd9b2fcc2d785591c0f60b
                        • Opcode Fuzzy Hash: 75432ad939849978f10c6893af99e1012d1877c6cd1ab50c51cdc46d97a61485
                        • Instruction Fuzzy Hash: FD015B71D00A1ADBCF00EFF9E888AEDBB79BF0A701F050156E905B3180DB315554CBA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?,?,?,00A9799D), ref: 00A9766F
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?,?), ref: 00A9768A
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?,?), ref: 00A97698
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?), ref: 00A976A8
                        • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A9758C,80070057,?,?), ref: 00A976B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: e7389572e6b23435f44259a9ffc7e4b6a83df1f55d5a3112aa58f6b8a055d3f3
                        • Instruction ID: c461993f63f052521b80e45b32f3d875d4fcdab81b0008052f75b70348a2bc75
                        • Opcode Fuzzy Hash: e7389572e6b23435f44259a9ffc7e4b6a83df1f55d5a3112aa58f6b8a055d3f3
                        • Instruction Fuzzy Hash: DC015E72615604AFDB119F58DC44EAE7BFDEB44751F150028FE04D2211E731DD4197B0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A98608
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A98612
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A98621
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A98628
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A9863E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: e30a1c00db3a1d442b6eebf97fe217f8ac371786ca6abd1418c102f938ae4acf
                        • Instruction ID: 146921e994fd6b53bce23b38fb570db2e654bf1bd55e8104630a64289318c4d4
                        • Opcode Fuzzy Hash: e30a1c00db3a1d442b6eebf97fe217f8ac371786ca6abd1418c102f938ae4acf
                        • Instruction Fuzzy Hash: 1EF04F35201204AFEB104FE9DC89E6B3FADFF8AB54B050525FA45CA150EB659C42DA60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A98669
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A98673
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A98682
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A98689
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A9869F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 4a9a6a8a1fbae0f2fecfcccabb272a7c70d8490ee42e811d3c2722ed50af5de7
                        • Instruction ID: bd65b772f78de0fa2365d9d6993f755312daf36261649e5e57eb9d8f68597da3
                        • Opcode Fuzzy Hash: 4a9a6a8a1fbae0f2fecfcccabb272a7c70d8490ee42e811d3c2722ed50af5de7
                        • Instruction Fuzzy Hash: DCF0AF74300204AFEB115FA5EC88E673FBDFF8A754B140026FA05CA150DA649802EA60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 00A9C6BA
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A9C6D1
                        • MessageBeep.USER32(00000000), ref: 00A9C6E9
                        • KillTimer.USER32(?,0000040A), ref: 00A9C705
                        • EndDialog.USER32(?,00000001), ref: 00A9C71F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: 0646259e09938dc8dc022b9aeaad7e29bc7c8671ceb28092fd826fea871fdc57
                        • Instruction ID: 410d5ea7ce75058afb97ff887a52b57fc5ba44db90f9954c7a14ebc32003f17a
                        • Opcode Fuzzy Hash: 0646259e09938dc8dc022b9aeaad7e29bc7c8671ceb28092fd826fea871fdc57
                        • Instruction Fuzzy Hash: 53018630500704ABEF219BA0DD4EF9677B9FF00715F000669F682A14E1EBF0A9558F80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • EndPath.GDI32(?), ref: 00A413BF
                        • StrokeAndFillPath.GDI32(?,?,00A7BAD8,00000000,?), ref: 00A413DB
                        • SelectObject.GDI32(?,00000000), ref: 00A413EE
                        • DeleteObject.GDI32 ref: 00A41401
                        • StrokePath.GDI32(?), ref: 00A4141C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: fe97992573b7679649a106a2639695bf32c5d36c16b434785739a474ee721cd5
                        • Instruction ID: abd32ffec5361e3189f0ce1d0f381995b30863c47607f6e7271215f88913d053
                        • Opcode Fuzzy Hash: fe97992573b7679649a106a2639695bf32c5d36c16b434785739a474ee721cd5
                        • Instruction Fuzzy Hash: 66F0E774004308EFDB159FA6EC0CB583FA5AB61726F04C226F4698A0F1DB3189A6DF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CoInitialize.OLE32(00000000), ref: 00AAC69D
                        • CoCreateInstance.OLE32(00AD2D6C,00000000,00000001,00AD2BDC,?), ref: 00AAC6B5
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                        • CoUninitialize.OLE32 ref: 00AAC922
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_memmove
                        • String ID: .lnk
                        • API String ID: 2683427295-24824748
                        • Opcode ID: 957c86e20935c62c5ec9580b318953eb453078461cf75b22a3cff8a74fc3b4fa
                        • Instruction ID: 398f8abe1cf9933f753090e155e719260f7380cfc48edcc86ec2f004ae2979ea
                        • Opcode Fuzzy Hash: 957c86e20935c62c5ec9580b318953eb453078461cf75b22a3cff8a74fc3b4fa
                        • Instruction Fuzzy Hash: BCA13C75104205AFD700EF64C981EAFB7E8EFD5754F00492DF1969B2A2EB70EA09CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A60FF6: std::exception::exception.LIBCMT ref: 00A6102C
                          • Part of subcall function 00A60FF6: __CxxThrowException@8.LIBCMT ref: 00A61041
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00A47BB1: _memmove.LIBCMT ref: 00A47C0B
                        • __swprintf.LIBCMT ref: 00A5302D
                        Strings
                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00A52EC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                        • API String ID: 1943609520-557222456
                        • Opcode ID: 579efa57e957af7c91b1c882017ec721baff44f1ad714207c820862e49d76881
                        • Instruction ID: 729b3a7ed20e917cd6972a8ca4bf321466ba470b9240b8498d172c49bfabb635
                        • Opcode Fuzzy Hash: 579efa57e957af7c91b1c882017ec721baff44f1ad714207c820862e49d76881
                        • Instruction Fuzzy Hash: 719158765083419FCB18EF24DA95C6EB7B4EF85740F04491DF9829B2A2DB30EE49CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A448AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A448A1,?,?,00A437C0,?), ref: 00A448CE
                        • CoInitialize.OLE32(00000000), ref: 00AABC26
                        • CoCreateInstance.OLE32(00AD2D6C,00000000,00000001,00AD2BDC,?), ref: 00AABC3F
                        • CoUninitialize.OLE32 ref: 00AABC5C
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                        • String ID: .lnk
                        • API String ID: 2126378814-24824748
                        • Opcode ID: bf469e5d1e515dadf874d5f3d0be522a274791e775b3e7715e1e58ec7fbc7936
                        • Instruction ID: 01a1a2aa1a1a085b5d51d39afa57d373710573480f998bdac223c19b0220b24d
                        • Opcode Fuzzy Hash: bf469e5d1e515dadf874d5f3d0be522a274791e775b3e7715e1e58ec7fbc7936
                        • Instruction Fuzzy Hash: 77A136756043419FCB10DF24C584E6ABBE5FF89314F148998F89A9B3A2CB31ED45CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 00A652DD
                          • Part of subcall function 00A70340: __87except.LIBCMT ref: 00A7037B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorHandling__87except__start
                        • String ID: pow
                        • API String ID: 2905807303-2276729525
                        • Opcode ID: 3dfcb855ac99d195ada3fc44b6859a4c173da53a1af7f1fd78e3bc28c1bcae6a
                        • Instruction ID: bb8501bbd28fa528bebb2220e796f60d18b4ae81c40e245ab052cc184dca699c
                        • Opcode Fuzzy Hash: 3dfcb855ac99d195ada3fc44b6859a4c173da53a1af7f1fd78e3bc28c1bcae6a
                        • Instruction Fuzzy Hash: 5A515A31E1D601C7CB15B734CE61BBE7BB49B00B50F20C95AE0DA8A2E5EF748CD49A46
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID: #$+
                        • API String ID: 0-2552117581
                        • Opcode ID: d8fbf6895b9f3729930f0f3200c5283ead4b8b4482b707c57fe3d7a40141d47a
                        • Instruction ID: 2002ea3d16089d9f63cb45022942e7033e1b0874027fe107d9b9a32b4fe3fb53
                        • Opcode Fuzzy Hash: d8fbf6895b9f3729930f0f3200c5283ead4b8b4482b707c57fe3d7a40141d47a
                        • Instruction Fuzzy Hash: B5512179A046868FDF16DF78C48AAFA7BB4EF5A310F144055E8919F2A0D7349C86CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memset$_memmove
                        • String ID: ERCP
                        • API String ID: 2532777613-1384759551
                        • Opcode ID: aecf25fc3e3dda03406552532d910477fbcc61451ca6c1ce208f8554b9345cc8
                        • Instruction ID: b99960ad6acb0247f41a9b46300aa40c7ae324dc7bcda96be030b08976bd90a2
                        • Opcode Fuzzy Hash: aecf25fc3e3dda03406552532d910477fbcc61451ca6c1ce208f8554b9345cc8
                        • Instruction Fuzzy Hash: 0251B171A003099FDB24CF65C981BAABBF4FF04355F60856EEA4ACB241E771D689CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00ACF910,00000000,?,?,?,?), ref: 00AC7C4E
                        • GetWindowLongW.USER32 ref: 00AC7C6B
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00AC7C7B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: 2fd6b58c984bad7fc68d3d6380922bdbdd87b01cd127cef647b4c05627fa9379
                        • Instruction ID: 44962aac8f9b2d4b2933c42e123f63dc5440b54df923392403ff70271f05b476
                        • Opcode Fuzzy Hash: 2fd6b58c984bad7fc68d3d6380922bdbdd87b01cd127cef647b4c05627fa9379
                        • Instruction Fuzzy Hash: A6318D3160820AAEDB118F78CC41FEA7BA9EB45324F254729F975A22E0D731EC519B60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00AC76D0
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00AC76E4
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00AC7708
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$Window
                        • String ID: SysMonthCal32
                        • API String ID: 2326795674-1439706946
                        • Opcode ID: f5512bbe030a7908f9b676f7f2c78c248412c7228bc841fe4dbfdc859c9c19c7
                        • Instruction ID: c5e6401441541c60c7349044aa2791ae48029ab4cc045e485754541d4e35f40a
                        • Opcode Fuzzy Hash: f5512bbe030a7908f9b676f7f2c78c248412c7228bc841fe4dbfdc859c9c19c7
                        • Instruction Fuzzy Hash: A8219F32510219BBDF15CFA4CC46FEE3B79EB48714F120218FE156B1D0DAB1A8519BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00AC6FAA
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00AC6FBA
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00AC6FDF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: f7be45c855f3d7725aa3d7cc7973ff11f40e75a32c59c9f66e421aa6d75c64ff
                        • Instruction ID: 79758ea6d2c24976c9c9e634f654b916a744e493686c77cd924ecc2b1d052064
                        • Opcode Fuzzy Hash: f7be45c855f3d7725aa3d7cc7973ff11f40e75a32c59c9f66e421aa6d75c64ff
                        • Instruction Fuzzy Hash: 85218032610118BFDF11CF54DC85FAB37AAEF89754F02812CFA549B190CA71AC518BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00AC79E1
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00AC79F6
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00AC7A03
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: 34886e4412a4c3e217c336c7eb3a8cc3e9f353fc80027667b27f6987e746b9da
                        • Instruction ID: 6b0d7a2c15e37cfc99cee5712e228e7d1e40ca2d7c43441e590e77c2b6ebcb7f
                        • Opcode Fuzzy Hash: 34886e4412a4c3e217c336c7eb3a8cc3e9f353fc80027667b27f6987e746b9da
                        • Instruction Fuzzy Hash: 0A11E372254208BFEF149F61CC05FEF7BA9EF89B64F02051DFA41A6090D6729851CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00A44C2E), ref: 00A44CA3
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00A44CB5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetNativeSystemInfo$kernel32.dll
                        • API String ID: 2574300362-192647395
                        • Opcode ID: 3a0014079ed3f8eda53391a3f6203f41b7ebbf070fa7ed31d5eefd542fec1f29
                        • Instruction ID: cc9504b1963ca2c8f912643f03caacd0bd52e64f4e5ff1ef832f4fa1e3ca88d1
                        • Opcode Fuzzy Hash: 3a0014079ed3f8eda53391a3f6203f41b7ebbf070fa7ed31d5eefd542fec1f29
                        • Instruction Fuzzy Hash: C2D01274510723DFD7209F71D958B0676D6AF05751B1ACC3E9886D6150D770D880C650
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00A44CE1,?), ref: 00A44DA2
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A44DB4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 2574300362-1355242751
                        • Opcode ID: a8e2b1edb67e21a4f98b6821a6415cabe3cd647c0fa798aca2d57906c5ee6a66
                        • Instruction ID: aabd3eef59e17cbd33ef23923dd3d0faa8b7b2df95a1fd56659396450141c96e
                        • Opcode Fuzzy Hash: a8e2b1edb67e21a4f98b6821a6415cabe3cd647c0fa798aca2d57906c5ee6a66
                        • Instruction Fuzzy Hash: 8CD01735950713DFEB209FB1D808B4AB6E5AF09356B16CC3EE9C6D6150EB70D880CA50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00A44D2E,?,00A44F4F,?,00B062F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A44D6F
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A44D81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 2574300362-3689287502
                        • Opcode ID: b7584429fc934ce48a7ed4c8fb68d3d5d6c0b972b4d65754f9b14eed673dc7cb
                        • Instruction ID: e728a9070395998aaf2360a46639829332831db5bb15dbac2fc7dfb84faa16d0
                        • Opcode Fuzzy Hash: b7584429fc934ce48a7ed4c8fb68d3d5d6c0b972b4d65754f9b14eed673dc7cb
                        • Instruction Fuzzy Hash: AED01734910713DFDB209FB1D808B26B6E9BF19352B16CD3EA597D6250EB70D880CA50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(advapi32.dll,?,00AC12C1), ref: 00AC1080
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00AC1092
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2574300362-4033151799
                        • Opcode ID: a67e8645553a4d61c1f6d7f9be57a513cf78cf6157e90645038a612eeea311e9
                        • Instruction ID: c59efc6c0fb668826e52f072da08f6409c23424f2ccb66e9d742d4a2c76d6b1e
                        • Opcode Fuzzy Hash: a67e8645553a4d61c1f6d7f9be57a513cf78cf6157e90645038a612eeea311e9
                        • Instruction Fuzzy Hash: B4D01730620712DFD720DFB5D818E6A76F5AF06361F1A8D3EA58ADA190E770C8C0CA60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00AB9009,?,00ACF910), ref: 00AB9403
                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00AB9415
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetModuleHandleExW$kernel32.dll
                        • API String ID: 2574300362-199464113
                        • Opcode ID: b1dc69d79c2689309291c7de386e98eb43921d1c0377be2d8110f0107c8eb9fc
                        • Instruction ID: 2c8017b5d4a4ebab39d0b0e6177f2bf0dabdd9c8a146488a999632cfba482fff
                        • Opcode Fuzzy Hash: b1dc69d79c2689309291c7de386e98eb43921d1c0377be2d8110f0107c8eb9fc
                        • Instruction Fuzzy Hash: F8D02E30540723DFCB208FB0CA08A83BAEABF00342B06CC3EE686D2550E770C881CB10
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: LocalTime__swprintf
                        • String ID: %.3d$WIN_XPe
                        • API String ID: 2070861257-2409531811
                        • Opcode ID: 195616274aead8fe843a612914b828b55ef9b7ec5fb410898f81a33cb30b8d38
                        • Instruction ID: 5a85bfa3b3578b284e572ff252368040a047eeefaa86ce971f1771c44978ee24
                        • Opcode Fuzzy Hash: 195616274aead8fe843a612914b828b55ef9b7ec5fb410898f81a33cb30b8d38
                        • Instruction Fuzzy Hash: 3FD017B6804118EACB44BBD08C88DFA737CAB08311F5005A2B90AA2000F2349B86AB21
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: be16a7b239d82a8d7596bba0f2596d870c70dbe3ff69d042ca6553a9deaed764
                        • Instruction ID: a3ce8dffd52aef677e43d2a5b49b982ebaa97f2e5e48cfc72b13158de4917018
                        • Opcode Fuzzy Hash: be16a7b239d82a8d7596bba0f2596d870c70dbe3ff69d042ca6553a9deaed764
                        • Instruction Fuzzy Hash: 90C11975A14216EFCF14CF98C884AAEBBF5FF48714B158599E805EB251D730EE81CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharLowerBuffW.USER32(?,?), ref: 00ABE3D2
                        • CharLowerBuffW.USER32(?,?), ref: 00ABE415
                          • Part of subcall function 00ABDAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00ABDAD9
                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00ABE615
                        • _memmove.LIBCMT ref: 00ABE628
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: BuffCharLower$AllocVirtual_memmove
                        • String ID:
                        • API String ID: 3659485706-0
                        • Opcode ID: 7d7b9299f2a3b5115e8d1c1ab968eb4bb3fa558825bca31d3bc87827aaa4599a
                        • Instruction ID: 33518b4b110303eab6585e7dd1cf42b9ad95dcae28521d45134837f67b457181
                        • Opcode Fuzzy Hash: 7d7b9299f2a3b5115e8d1c1ab968eb4bb3fa558825bca31d3bc87827aaa4599a
                        • Instruction Fuzzy Hash: C3C15B756083419FC714DF28C5809AABBF4FF88714F14896DF8999B352D731E946CB82
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CoInitialize.OLE32(00000000), ref: 00AB83D8
                        • CoUninitialize.OLE32 ref: 00AB83E3
                          • Part of subcall function 00A9DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A9DAC5
                        • VariantInit.OLEAUT32(?), ref: 00AB83EE
                        • VariantClear.OLEAUT32(?), ref: 00AB86BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                        • String ID:
                        • API String ID: 780911581-0
                        • Opcode ID: 78c261d9b9c5e972f0a99027e4e8219990db28331532515109ef90a57185557b
                        • Instruction ID: c25f47f186b2af62f53d36f5cdc43300481872e72865b3eab4c199fecffb0060
                        • Opcode Fuzzy Hash: 78c261d9b9c5e972f0a99027e4e8219990db28331532515109ef90a57185557b
                        • Instruction Fuzzy Hash: 0EA147792047019FCB10DF28C991B6AB7E8BF88354F04495DF99A9B3A2CB34ED51CB42
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00AD2C7C,?), ref: 00A97C32
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00AD2C7C,?), ref: 00A97C4A
                        • CLSIDFromProgID.OLE32(?,?,00000000,00ACFB80,000000FF,?,00000000,00000800,00000000,?,00AD2C7C,?), ref: 00A97C6F
                        • _memcmp.LIBCMT ref: 00A97C90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID:
                        • API String ID: 314563124-0
                        • Opcode ID: de82313cecce997c4dad812ca899e61b1049a94e5fdd23110a9a323089a9fe72
                        • Instruction ID: 6499f198501619d5e34ad90d0b4ed19d61330e431e1663d1f6d942df251b6861
                        • Opcode Fuzzy Hash: de82313cecce997c4dad812ca899e61b1049a94e5fdd23110a9a323089a9fe72
                        • Instruction Fuzzy Hash: DF81F875A10109EFCF04DF94C984EEEB7B9FF89315F204598E506AB250DB71AE06CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Variant$AllocClearCopyInitString
                        • String ID:
                        • API String ID: 2808897238-0
                        • Opcode ID: 802e4fa6c69e2785321bc063de79ad4b84c6cea336999d67e707922152b6effc
                        • Instruction ID: d019190a111940aae9888ca17a545a114bc3ed50c0e4e9a0da851a489ffbc115
                        • Opcode Fuzzy Hash: 802e4fa6c69e2785321bc063de79ad4b84c6cea336999d67e707922152b6effc
                        • Instruction Fuzzy Hash: 815183747183029EDF24AF65D995A7EB3F5AF48310F20881FE596CB291DB709880DB21
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetWindowRect.USER32(0153E068,?), ref: 00AC9AD2
                        • ScreenToClient.USER32(00000002,00000002), ref: 00AC9B05
                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00AC9B72
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$ClientMoveRectScreen
                        • String ID:
                        • API String ID: 3880355969-0
                        • Opcode ID: e104057ce4ba2bd652938fe5c870515739d1ff36033a099ae8da2d09a4776321
                        • Instruction ID: eb9bd750db3c028a397d377a803605c2e48796c22006790fefc539f8d15d6807
                        • Opcode Fuzzy Hash: e104057ce4ba2bd652938fe5c870515739d1ff36033a099ae8da2d09a4776321
                        • Instruction Fuzzy Hash: F5512C35A00209EFCF14DF68D985EAE7BB6FB54360F11815DF8259B2A0D730AD91CB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00AB6CE4
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB6CF4
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00AB6D58
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB6D64
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ErrorLast$__itow__swprintfsocket
                        • String ID:
                        • API String ID: 2214342067-0
                        • Opcode ID: 71297f1e6bfa92e38605e3cb12d9876e9cd974a536b0cc9111b2802a0c12d995
                        • Instruction ID: 70dd56a4adefe975c0392b9f43ddcc909faf934074dd2da03e11f47588d725ac
                        • Opcode Fuzzy Hash: 71297f1e6bfa92e38605e3cb12d9876e9cd974a536b0cc9111b2802a0c12d995
                        • Instruction Fuzzy Hash: E4418278740200AFEB10AF24DD87F7B77E99B88B10F448018FA599B2D3DAB59D018791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00ACF910), ref: 00AB67BA
                        • _strlen.LIBCMT ref: 00AB67EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _strlen
                        • String ID:
                        • API String ID: 4218353326-0
                        • Opcode ID: 38875a87e8040a5fe72fcf6d6bacbd95c0218b520fe5eac0c3c8469bf3b1902c
                        • Instruction ID: 390c7d045b41b0de92a4b5fae0e3c1c2d0ba80bdcfbf7af1b0d373beee2ceec3
                        • Opcode Fuzzy Hash: 38875a87e8040a5fe72fcf6d6bacbd95c0218b520fe5eac0c3c8469bf3b1902c
                        • Instruction Fuzzy Hash: EA41B135A00104AFCB14EBA4DED5EEEB7BDEF48310F148169F8169B292DB34AD41CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00AABB09
                        • GetLastError.KERNEL32(?,00000000), ref: 00AABB2F
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00AABB54
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00AABB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 69bab4eaa1f92eaf6b961d5de5ba3748c5ac5510aaa89cb809455d0233d39fd5
                        • Instruction ID: fa4c15e7790d15ca5554566d1b4e33c8ebac6fa65785f5cdb512c9372f27ab84
                        • Opcode Fuzzy Hash: 69bab4eaa1f92eaf6b961d5de5ba3748c5ac5510aaa89cb809455d0233d39fd5
                        • Instruction Fuzzy Hash: 9C411A39200610DFCB11EF15C685A5EBBE1EF89310B198498FC4A9B7A2CB35FD11CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00AC8B4D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: InvalidateRect
                        • String ID:
                        • API String ID: 634782764-0
                        • Opcode ID: 521e761e5291150781e666c4b9a646d21b0f12db36cd2b4eec52bc1e6d55d82f
                        • Instruction ID: 254f4c77051c813dddde66514161049b6246602e76aa4e9a29e6d4c41b045447
                        • Opcode Fuzzy Hash: 521e761e5291150781e666c4b9a646d21b0f12db36cd2b4eec52bc1e6d55d82f
                        • Instruction Fuzzy Hash: 0E31B0B4601208BEEF209B58CC85FAE77A5FB05350F26851EFA51DB2A0CF38AD509B51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ClientToScreen.USER32(?,?), ref: 00ACAE1A
                        • GetWindowRect.USER32(?,?), ref: 00ACAE90
                        • PtInRect.USER32(?,?,00ACC304), ref: 00ACAEA0
                        • MessageBeep.USER32(00000000), ref: 00ACAF11
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: a68eac3ff1d7686e92a3c3e3f96922e4507f61d8dc6d4c0729aad8d36db62a78
                        • Instruction ID: 140237c37c8f06cca7be67c20e99dbdefa837d685f262c6bd3b87aedfbd083f4
                        • Opcode Fuzzy Hash: a68eac3ff1d7686e92a3c3e3f96922e4507f61d8dc6d4c0729aad8d36db62a78
                        • Instruction Fuzzy Hash: A2417C71A0022DDFCB11CF58C884F69BBF5FB68744F1681ADE4148B261D730A942CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00AA1037
                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00AA1053
                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00AA10B9
                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00AA110B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 4532e96679f3bdfcfcd183128b35bff0cbaac74c8733398c76fd6117ae6fc40a
                        • Instruction ID: db9c9d2337a432f97757dfd6d136a38a9c4c21ed55403a3d5cf8b1996776605c
                        • Opcode Fuzzy Hash: 4532e96679f3bdfcfcd183128b35bff0cbaac74c8733398c76fd6117ae6fc40a
                        • Instruction Fuzzy Hash: CA312430E44698BEFB31CB698C05BFABBBAAB4A320F08431AE591531D1C3758DC59765
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?,7608C0D0,?,00008000), ref: 00AA1176
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00AA1192
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00AA11F1
                        • SendInput.USER32(00000001,?,0000001C,7608C0D0,?,00008000), ref: 00AA1243
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: c7150d1a105bd98322dd111540b4fb16f8ce28a2ad57669a51b0fd8af115cb4e
                        • Instruction ID: d45551ab8d500259b3f57238dfd8325d7c9ccba9168e9b80b3732fa55bce1888
                        • Opcode Fuzzy Hash: c7150d1a105bd98322dd111540b4fb16f8ce28a2ad57669a51b0fd8af115cb4e
                        • Instruction Fuzzy Hash: F0312630A4071C7EEF21CBA58C04BFABBBAAB4B310F04432FE691931D1D33589959791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00A7644B
                        • __isleadbyte_l.LIBCMT ref: 00A76479
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A764A7
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A764DD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: 3f1d59e51bb38118150b7d800515961605f3a55dc1c2f2ce88d5021c4acb5ca3
                        • Instruction ID: 28f395d24143690b61fb7a63e1c8f7676fd6d143a4f589e4be1d9e020e6b1e15
                        • Opcode Fuzzy Hash: 3f1d59e51bb38118150b7d800515961605f3a55dc1c2f2ce88d5021c4acb5ca3
                        • Instruction Fuzzy Hash: 9031DE31600A46AFDB218F65CE44BAA7BB9FF40310F19C129E858871A0EB31D851DB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetForegroundWindow.USER32 ref: 00AC5189
                          • Part of subcall function 00AA387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00AA3897
                          • Part of subcall function 00AA387D: GetCurrentThreadId.KERNEL32 ref: 00AA389E
                          • Part of subcall function 00AA387D: AttachThreadInput.USER32(00000000,?,00AA52A7), ref: 00AA38A5
                        • GetCaretPos.USER32(?), ref: 00AC519A
                        • ClientToScreen.USER32(00000000,?), ref: 00AC51D5
                        • GetForegroundWindow.USER32 ref: 00AC51DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: df7274d377d4394110115d5db142f44e25ce1eff06025ddffa2435553afe39d7
                        • Instruction ID: 50c82d0f5c0cfded02a7b4b7e3f8a4e92df4fdc9dad7d8bb47ff1afab6397f01
                        • Opcode Fuzzy Hash: df7274d377d4394110115d5db142f44e25ce1eff06025ddffa2435553afe39d7
                        • Instruction Fuzzy Hash: 49310C76900108AFDB00EFA5C985EEFB7F9EF98300F11406AE415E7241EA75AE45CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • GetCursorPos.USER32(?), ref: 00ACC7C2
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A7BBFB,?,?,?,?,?), ref: 00ACC7D7
                        • GetCursorPos.USER32(?), ref: 00ACC824
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A7BBFB,?,?,?), ref: 00ACC85E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: 47555e2b1e18f2a239eaf3eedb9b545650851d154ea54d98b0c2e5556e73e4e3
                        • Instruction ID: 3dcc6d59dcab82ffe8932dfb7e34c42c9efdc8260d8e4357ce9494722d31a84a
                        • Opcode Fuzzy Hash: 47555e2b1e18f2a239eaf3eedb9b545650851d154ea54d98b0c2e5556e73e4e3
                        • Instruction Fuzzy Hash: EE317135600118AFCB15CF98C898FEB7BFAEB49720F454169F9098B261CB359D61DFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A98652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A98669
                          • Part of subcall function 00A98652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A98673
                          • Part of subcall function 00A98652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A98682
                          • Part of subcall function 00A98652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A98689
                          • Part of subcall function 00A98652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A9869F
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A98BEB
                        • _memcmp.LIBCMT ref: 00A98C0E
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A98C44
                        • HeapFree.KERNEL32(00000000), ref: 00A98C4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: b1257484a6fd60a0e571dd39f8b7cf7edb0745e9a093fcd4fc21f58be48095c8
                        • Instruction ID: 82126982d871619cc72dc3dbb44ec6889a39890ca0822d2442072c1531a26cc2
                        • Opcode Fuzzy Hash: b1257484a6fd60a0e571dd39f8b7cf7edb0745e9a093fcd4fc21f58be48095c8
                        • Instruction Fuzzy Hash: F7218971E01208EFCF00DFA4C944BAEB7F8EF41341F09405AE954AB240EB38AA06CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __setmode.LIBCMT ref: 00A60BF2
                          • Part of subcall function 00A45B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AA7B20,?,?,00000000), ref: 00A45B8C
                          • Part of subcall function 00A45B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AA7B20,?,?,00000000,?,?), ref: 00A45BB0
                        • _fprintf.LIBCMT ref: 00A60C29
                        • OutputDebugStringW.KERNEL32(?), ref: 00A96331
                          • Part of subcall function 00A64CDA: _flsall.LIBCMT ref: 00A64CF3
                        • __setmode.LIBCMT ref: 00A60C5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                        • String ID:
                        • API String ID: 521402451-0
                        • Opcode ID: 9a160194f639125ce4dc68eb1e54feecd69a6aa1c0cc048eefad41db8c89aeec
                        • Instruction ID: fceef5da4500da107c39755cddf659fb01600e9e1edef95ead171e45c88db089
                        • Opcode Fuzzy Hash: 9a160194f639125ce4dc68eb1e54feecd69a6aa1c0cc048eefad41db8c89aeec
                        • Instruction Fuzzy Hash: 8511E132A042087BCB04B7B4AE86DBF7B79DF89320F14011AF204972D2EF215D969795
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00AB1A97
                          • Part of subcall function 00AB1B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00AB1B40
                          • Part of subcall function 00AB1B21: InternetCloseHandle.WININET(00000000), ref: 00AB1BDD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Internet$CloseConnectHandleOpen
                        • String ID:
                        • API String ID: 1463438336-0
                        • Opcode ID: 0af4d6499457befd4f2c1ed1234ee153a36f0bb61c42228ce4d37a0a74dae96f
                        • Instruction ID: bb0e8c72ef6ffa42f1ce1c9d16b42615a20b3894a101bd66338692c30285adee
                        • Opcode Fuzzy Hash: 0af4d6499457befd4f2c1ed1234ee153a36f0bb61c42228ce4d37a0a74dae96f
                        • Instruction Fuzzy Hash: AE21A135200605BFEB119F608C15FFBB7BEFF48701F51401AFA1196662EB71E821ABA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A9F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00A9E1C4,?,?,?,00A9EFB7,00000000,000000EF,00000119,?,?), ref: 00A9F5BC
                          • Part of subcall function 00A9F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00A9F5E2
                          • Part of subcall function 00A9F5AD: lstrcmpiW.KERNEL32(00000000,?,00A9E1C4,?,?,?,00A9EFB7,00000000,000000EF,00000119,?,?), ref: 00A9F613
                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00A9EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00A9E1DD
                        • lstrcpyW.KERNEL32(00000000,?), ref: 00A9E203
                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A9EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00A9E237
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: lstrcmpilstrcpylstrlen
                        • String ID: cdecl
                        • API String ID: 4031866154-3896280584
                        • Opcode ID: 7af48ff9c6c6ae99eb5afb804f69278f927856b785ccfdbe1bb1d69022e26db1
                        • Instruction ID: 2ced0cd88282a98a8c675af6f08f3831696123cf1607e27f05d260743c7ca230
                        • Opcode Fuzzy Hash: 7af48ff9c6c6ae99eb5afb804f69278f927856b785ccfdbe1bb1d69022e26db1
                        • Instruction Fuzzy Hash: 0211AC3A200245EFCF25EF64D845EBA77F9FF84350B45402AF906CB260EB71D85187A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _free.LIBCMT ref: 00A75351
                          • Part of subcall function 00A6594C: __FF_MSGBANNER.LIBCMT ref: 00A65963
                          • Part of subcall function 00A6594C: __NMSG_WRITE.LIBCMT ref: 00A6596A
                          • Part of subcall function 00A6594C: RtlAllocateHeap.NTDLL(01520000,00000000,00000001,00000000,?,?,?,00A61013,?), ref: 00A6598F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: AllocateHeap_free
                        • String ID:
                        • API String ID: 614378929-0
                        • Opcode ID: 89b2567eeb1918d93d7c5d041c1a013c50d8e5626c6b8fc8e9e665a11c0908e7
                        • Instruction ID: 30221885225a14492719738f27eb4a6432d16719f51f518d1d6fc16c37f356ed
                        • Opcode Fuzzy Hash: 89b2567eeb1918d93d7c5d041c1a013c50d8e5626c6b8fc8e9e665a11c0908e7
                        • Instruction Fuzzy Hash: BF119132D04A15AECF212F70AD6565A3BA89F113A0F10C52AF9499E1A1DEF9C94197A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00A44560
                          • Part of subcall function 00A4410D: _memset.LIBCMT ref: 00A4418D
                          • Part of subcall function 00A4410D: _wcscpy.LIBCMT ref: 00A441E1
                          • Part of subcall function 00A4410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A441F1
                        • KillTimer.USER32(?,00000001,?,?), ref: 00A445B5
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A445C4
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A7D6CE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                        • String ID:
                        • API String ID: 1378193009-0
                        • Opcode ID: 7f312a8ef2043f19d00dd1025e6dc8a1fa90e693c4eb9a653bc8de45c8639d4f
                        • Instruction ID: 1d1e620a207cb81827aab605a8c3a42983970405d528baadd9214cb00257f630
                        • Opcode Fuzzy Hash: 7f312a8ef2043f19d00dd1025e6dc8a1fa90e693c4eb9a653bc8de45c8639d4f
                        • Instruction Fuzzy Hash: 28210474904784AFEB328B24CC45BE7BBFC9F55308F00809EE29E56281C7745E858B52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A45B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AA7B20,?,?,00000000), ref: 00A45B8C
                          • Part of subcall function 00A45B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AA7B20,?,?,00000000,?,?), ref: 00A45BB0
                        • gethostbyname.WSOCK32(?,?,?), ref: 00AB66AC
                        • WSAGetLastError.WSOCK32(00000000), ref: 00AB66B7
                        • _memmove.LIBCMT ref: 00AB66E4
                        • inet_ntoa.WSOCK32(?), ref: 00AB66EF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                        • String ID:
                        • API String ID: 1504782959-0
                        • Opcode ID: be62fc612fe2094c09294b538b9d4e5842add53d14d84680291f10da2401939f
                        • Instruction ID: b4e842ff581491a379d75b9479227e4b41319dd1caca5422892ec5460518a560
                        • Opcode Fuzzy Hash: be62fc612fe2094c09294b538b9d4e5842add53d14d84680291f10da2401939f
                        • Instruction Fuzzy Hash: 07116335900504AFCF04EBA4DE86DEE77BDEF44310B144065F502A7162DF309E15DB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00A99043
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A99055
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A9906B
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A99086
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 7297716099d22e394f633e5c38fba2d577d9a3213904c58bf3d4bbb3d72fe0a9
                        • Instruction ID: dc6cdf609398477057116efcfe8d1a984eaa15fecd29bc57f17f340d7d2563c4
                        • Opcode Fuzzy Hash: 7297716099d22e394f633e5c38fba2d577d9a3213904c58bf3d4bbb3d72fe0a9
                        • Instruction Fuzzy Hash: 9A115E79A01218FFDF10DFA9CD84E9EBBB4FB48310F204095E914B7250D6726E10DB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A42612: GetWindowLongW.USER32(?,000000EB), ref: 00A42623
                        • DefDlgProcW.USER32(?,00000020,?), ref: 00A412D8
                        • GetClientRect.USER32(?,?), ref: 00A7B84B
                        • GetCursorPos.USER32(?), ref: 00A7B855
                        • ScreenToClient.USER32(?,?), ref: 00A7B860
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Client$CursorLongProcRectScreenWindow
                        • String ID:
                        • API String ID: 4127811313-0
                        • Opcode ID: 957d5a00a2e353d8edc96b30836b2fe51c3e1e3c6ce4313773a2bbb5f9d0896d
                        • Instruction ID: 515a91edec1535f12daddcff56d5652ebbb0409011f7aa34b5037b958d460c6a
                        • Opcode Fuzzy Hash: 957d5a00a2e353d8edc96b30836b2fe51c3e1e3c6ce4313773a2bbb5f9d0896d
                        • Instruction Fuzzy Hash: 09114839A00119EFCB00EFA8D985DFE77B9FB45300F104466FA01E7250D770BA928BA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00AA01FD,?,00AA1250,?,00008000), ref: 00AA166F
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00AA01FD,?,00AA1250,?,00008000), ref: 00AA1694
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00AA01FD,?,00AA1250,?,00008000), ref: 00AA169E
                        • Sleep.KERNEL32(?,?,?,?,?,?,?,00AA01FD,?,00AA1250,?,00008000), ref: 00AA16D1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 3bf57d493c3b950b9ca3e62fe95de6f69614b62d4d0b0ea218ebe5886fcc9f13
                        • Instruction ID: 687b1bb2fc3662883862d2cc7ddfc2109c962963d289662b21d48acb1fe3f1e6
                        • Opcode Fuzzy Hash: 3bf57d493c3b950b9ca3e62fe95de6f69614b62d4d0b0ea218ebe5886fcc9f13
                        • Instruction Fuzzy Hash: 1B111831C00919EBCF00DFE5D948AEEBB78FF0A751F094556EA44F7280CB3095618B96
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                        • Instruction ID: dd143dede4959ad2de7cf9ad3fdcb0c8bf20f493db5f7552da0a6eb57ac738f2
                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                        • Instruction Fuzzy Hash: D3018C7214814ABBCF125F84CC018EE3F22BF29340B08C625FA2C58032C637C9B1AB81
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00ACB59E
                        • ScreenToClient.USER32(?,?), ref: 00ACB5B6
                        • ScreenToClient.USER32(?,?), ref: 00ACB5DA
                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00ACB5F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClientRectScreen$InvalidateWindow
                        • String ID:
                        • API String ID: 357397906-0
                        • Opcode ID: d4a73e0d6d3f6238e94192ebbdfa2e25119188bbb605a8f8804cf71355678342
                        • Instruction ID: 3c28802edea332cd4b455ee6372cb01c4d84d0a07991b285c6d4ba01ebf88cd8
                        • Opcode Fuzzy Hash: d4a73e0d6d3f6238e94192ebbdfa2e25119188bbb605a8f8804cf71355678342
                        • Instruction Fuzzy Hash: B31146B5D00249EFDB41CFD9C444AEEFBB5FB08310F104166E955E3220D735AA558F50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00ACB8FE
                        • _memset.LIBCMT ref: 00ACB90D
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00B07F20,00B07F64), ref: 00ACB93C
                        • CloseHandle.KERNEL32 ref: 00ACB94E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _memset$CloseCreateHandleProcess
                        • String ID:
                        • API String ID: 3277943733-0
                        • Opcode ID: f6d13604bfc3fede9866895670b38f022fd8ff0caa63ac04f7ad29159aff8d9c
                        • Instruction ID: 9db38e55510b98d342edfe1b03a544cf994afa6af34318d16c2a011a12addadc
                        • Opcode Fuzzy Hash: f6d13604bfc3fede9866895670b38f022fd8ff0caa63ac04f7ad29159aff8d9c
                        • Instruction Fuzzy Hash: F4F082B29883817FF6106761AC06FBBBA9CEB18354F014061BB08DA292DF716D0187B8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • EnterCriticalSection.KERNEL32(?), ref: 00AA6E88
                          • Part of subcall function 00AA794E: _memset.LIBCMT ref: 00AA7983
                        • _memmove.LIBCMT ref: 00AA6EAB
                        • _memset.LIBCMT ref: 00AA6EB8
                        • LeaveCriticalSection.KERNEL32(?), ref: 00AA6EC8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CriticalSection_memset$EnterLeave_memmove
                        • String ID:
                        • API String ID: 48991266-0
                        • Opcode ID: 3e0ddada6597497a3f412e11d51db8e66af5bdb488205fc3d03796fb3d56e9be
                        • Instruction ID: 9a4f8821ece53708c8eb0c60cc2f69c1ece8c45a96425188603af01a359496c7
                        • Opcode Fuzzy Hash: 3e0ddada6597497a3f412e11d51db8e66af5bdb488205fc3d03796fb3d56e9be
                        • Instruction Fuzzy Hash: 67F0543A104210ABCF416F55DD85E8ABB2AEF45320B04C061FE085F266C731A911CBB4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A412F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A4134D
                          • Part of subcall function 00A412F3: SelectObject.GDI32(?,00000000), ref: 00A4135C
                          • Part of subcall function 00A412F3: BeginPath.GDI32(?), ref: 00A41373
                          • Part of subcall function 00A412F3: SelectObject.GDI32(?,00000000), ref: 00A4139C
                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00ACC030
                        • LineTo.GDI32(00000000,?,?), ref: 00ACC03D
                        • EndPath.GDI32(00000000), ref: 00ACC04D
                        • StrokePath.GDI32(00000000), ref: 00ACC05B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                        • String ID:
                        • API String ID: 1539411459-0
                        • Opcode ID: ee18db31db2dc9f932ddedb93cbf7e0f08568af4d589c97666b8febef4d8b687
                        • Instruction ID: 0417c5627f6e367334a9e2d892d17f2c7f4003dd7b75ffdc4ca702aff5a5ce27
                        • Opcode Fuzzy Hash: ee18db31db2dc9f932ddedb93cbf7e0f08568af4d589c97666b8febef4d8b687
                        • Instruction Fuzzy Hash: 44F0BE31001219BFDB12AF90AC0AFCE3F5AAF15720F058010FA11610E2C7B50562CFD5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A9A399
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A9A3AC
                        • GetCurrentThreadId.KERNEL32 ref: 00A9A3B3
                        • AttachThreadInput.USER32(00000000), ref: 00A9A3BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: beb00895be417a8fdf4f5898ee4835d01af3c45aae89600e419cf7f4534965db
                        • Instruction ID: d3ab2f59b88001f6f12daa0ee564d9a81689697e1f1f5ea10e54b966a3f175f8
                        • Opcode Fuzzy Hash: beb00895be417a8fdf4f5898ee4835d01af3c45aae89600e419cf7f4534965db
                        • Instruction Fuzzy Hash: F7E03935241268BEDB209BA2DC0CED77FADEF267A1F018026FA0888060C6718541DBE0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetSysColor.USER32(00000008), ref: 00A42231
                        • SetTextColor.GDI32(?,000000FF), ref: 00A4223B
                        • SetBkMode.GDI32(?,00000001), ref: 00A42250
                        • GetStockObject.GDI32(00000005), ref: 00A42258
                        • GetWindowDC.USER32(?,00000000), ref: 00A7C0D3
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A7C0E0
                        • GetPixel.GDI32(00000000,?,00000000), ref: 00A7C0F9
                        • GetPixel.GDI32(00000000,00000000,?), ref: 00A7C112
                        • GetPixel.GDI32(00000000,?,?), ref: 00A7C132
                        • ReleaseDC.USER32(?,00000000), ref: 00A7C13D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                        • String ID:
                        • API String ID: 1946975507-0
                        • Opcode ID: a08b4313b69829e8ac3c86a2a4e5d94fba3ea79983250102d016fe00568eeb60
                        • Instruction ID: b594ef5e5da3779ec372fbf8b64b759e17276f3daf4c9724b7ede6f2a6642147
                        • Opcode Fuzzy Hash: a08b4313b69829e8ac3c86a2a4e5d94fba3ea79983250102d016fe00568eeb60
                        • Instruction Fuzzy Hash: 55E03932100244EEDB219FA8FC09BD83B11AB05332F04C37AFB69480E1C7714982DB11
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00A98C63
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A9882E), ref: 00A98C6A
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A9882E), ref: 00A98C77
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A9882E), ref: 00A98C7E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: 0876ad7bcaa9e80fffac097708744f1c3cce31926188810b5f37ea3f770ca8e0
                        • Instruction ID: 09166b0010005eabd860d172115844854ce8b03bbad30a8a0efe812f64708823
                        • Opcode Fuzzy Hash: 0876ad7bcaa9e80fffac097708744f1c3cce31926188810b5f37ea3f770ca8e0
                        • Instruction Fuzzy Hash: 06E08676742211EFDB609FF46D0CF963BADEF51B92F064828B645CD040EA388446CB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDesktopWindow.USER32 ref: 00A82187
                        • GetDC.USER32(00000000), ref: 00A82191
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A821B1
                        • ReleaseDC.USER32(?), ref: 00A821D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: f11459980ab6e14b78afa4e0b8e7f941281b4018c26d6b418212558431deb2a4
                        • Instruction ID: 0f58e903e4c97465cb2036302210a3dd0e3ee3689b903538f5d5a4fae8401917
                        • Opcode Fuzzy Hash: f11459980ab6e14b78afa4e0b8e7f941281b4018c26d6b418212558431deb2a4
                        • Instruction Fuzzy Hash: 8CE01AB5800214EFDB01DFA0C808AAEBFF2EB4C350F128425F95A97360DB3891429F40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDesktopWindow.USER32 ref: 00A8219B
                        • GetDC.USER32(00000000), ref: 00A821A5
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A821B1
                        • ReleaseDC.USER32(?), ref: 00A821D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: f538e6614e0427a5677477a9e0a59a63ac3c50f054bf9e96e9b16f0dc0a48d6c
                        • Instruction ID: 98a52bf904fda6807a4fd6971a7dcdaf00684dcd4dcd873bb5abf06fefbdc79c
                        • Opcode Fuzzy Hash: f538e6614e0427a5677477a9e0a59a63ac3c50f054bf9e96e9b16f0dc0a48d6c
                        • Instruction Fuzzy Hash: 2AE01AB5800204AFCB01DFB0C808A9EBFF2EB4C350F128025F95A97320DB3891429F40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • OleSetContainedObject.OLE32(?,00000001), ref: 00A9B981
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ContainedObject
                        • String ID: AutoIt3GUI$Container
                        • API String ID: 3565006973-3941886329
                        • Opcode ID: d3cbad646790f273a9f08a1145b3041149f324f95eb893eb839953579108597d
                        • Instruction ID: 4743122b6cc0aaa59e44a7b2ae6337162b3de723800099ee5fa67f3d017ce390
                        • Opcode Fuzzy Hash: d3cbad646790f273a9f08a1145b3041149f324f95eb893eb839953579108597d
                        • Instruction Fuzzy Hash: 1D915B74610201AFDB24DF68D984B6ABBF9FF48710F14856EF94ACB691DB70E841CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A5FEC6: _wcscpy.LIBCMT ref: 00A5FEE9
                          • Part of subcall function 00A49997: __itow.LIBCMT ref: 00A499C2
                          • Part of subcall function 00A49997: __swprintf.LIBCMT ref: 00A49A0C
                        • __wcsnicmp.LIBCMT ref: 00AAB298
                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00AAB361
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                        • String ID: LPT
                        • API String ID: 3222508074-1350329615
                        • Opcode ID: 4532ba61889124f108d7ce24512f97ce3d7ba34c15df6e59416f2c0dd2c6acf0
                        • Instruction ID: 4c0a43f9fb664c5bfe09998da314b14fa1b109fca89d720830ac2f800008d4a0
                        • Opcode Fuzzy Hash: 4532ba61889124f108d7ce24512f97ce3d7ba34c15df6e59416f2c0dd2c6acf0
                        • Instruction Fuzzy Hash: E9618E75A10215AFCF14DF94C981EAEB7B4EF49310F11446AF946AB392DB70AE44CBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00A52AC8
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00A52AE1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: dc9dc0a07c818c0139b2abe8733f688c5793f755a4402dbc31383e479542a207
                        • Instruction ID: 64ff4fe46e0236cf3e7265d0995c92e851558bc7cfce8d901270afe3f347b954
                        • Opcode Fuzzy Hash: dc9dc0a07c818c0139b2abe8733f688c5793f755a4402dbc31383e479542a207
                        • Instruction Fuzzy Hash: E55145724187449BD320AF50DC86BABBBE8FFC8310F52885DF1D9811A1DB30853ACB26
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A4506B: __fread_nolock.LIBCMT ref: 00A45089
                        • _wcscmp.LIBCMT ref: 00AA9AAE
                        • _wcscmp.LIBCMT ref: 00AA9AC1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: _wcscmp$__fread_nolock
                        • String ID: FILE
                        • API String ID: 4029003684-3121273764
                        • Opcode ID: 11cbb1c0aa40339e4d2e3c4866062ee1ad4b7eb0336f7f0a2a36e73093ca2b38
                        • Instruction ID: f690d8a9b13591ab43c3e98922daa9b6faafd871aad67cdd1e6b7febc3f15c14
                        • Opcode Fuzzy Hash: 11cbb1c0aa40339e4d2e3c4866062ee1ad4b7eb0336f7f0a2a36e73093ca2b38
                        • Instruction Fuzzy Hash: AE41C475A00619BBDF209BA4DC45FEFBBB9DF8A710F00047AB904AB1C1DB759A0587A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AB2892
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00AB28C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CrackInternet_memset
                        • String ID: |
                        • API String ID: 1413715105-2343686810
                        • Opcode ID: 832d4637081110eb43309d6baddca2f8a85813eec511de0c55f3895e0c33d1a3
                        • Instruction ID: f4dacf3d8300e738fd19f32ef89b00e1e7bc975c3cb5fb860f481e6505745bf7
                        • Opcode Fuzzy Hash: 832d4637081110eb43309d6baddca2f8a85813eec511de0c55f3895e0c33d1a3
                        • Instruction Fuzzy Hash: 05314B75800119AFCF01EFA1CD85EEEBFB9FF08350F10402AF815A6166EB715A56DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 00AC6D86
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00AC6DC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: 10f839590cc9dc23185c1c74b1f4a6b1709179266d91f3daea5a64ff3245ae5b
                        • Instruction ID: 73ed551c4b1153f21cceffdcca4a7431ce6506525687207d9e81c1e4644e1196
                        • Opcode Fuzzy Hash: 10f839590cc9dc23185c1c74b1f4a6b1709179266d91f3daea5a64ff3245ae5b
                        • Instruction Fuzzy Hash: 2C316D71210604AEDB11DF68CC81FFB77A9FF48764F11861DF9A697190DA31AC92CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AA2E00
                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00AA2E3B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: InfoItemMenu_memset
                        • String ID: 0
                        • API String ID: 2223754486-4108050209
                        • Opcode ID: 460841d6e1f4327975890615eb385d40bf5c88ca25865b93df47cee67f8ae633
                        • Instruction ID: b9708677ae944f684010c566eac6a377fb2abcbee35af4cc628e74b803bef380
                        • Opcode Fuzzy Hash: 460841d6e1f4327975890615eb385d40bf5c88ca25865b93df47cee67f8ae633
                        • Instruction Fuzzy Hash: D031A531A00309ABEB348F5CD945BAEBFB9EF06350F14446AE985971E1D77099A4CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00AC69D0
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00AC69DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: d4f24f24d04637f160d1467bdc05a0ab047abafd6adcf0795243337b63e942fe
                        • Instruction ID: 91d59dfabe55f13de267514dc9370278a5fb2f1f36f0e07a8f3cb9a927f8cd12
                        • Opcode Fuzzy Hash: d4f24f24d04637f160d1467bdc05a0ab047abafd6adcf0795243337b63e942fe
                        • Instruction Fuzzy Hash: 8411B271600208AFEF11DF54CC80FFB37AAEB993A4F120128F9589B290D6719C9187A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A41D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A41D73
                          • Part of subcall function 00A41D35: GetStockObject.GDI32(00000011), ref: 00A41D87
                          • Part of subcall function 00A41D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A41D91
                        • GetWindowRect.USER32(00000000,?), ref: 00AC6EE0
                        • GetSysColor.USER32(00000012), ref: 00AC6EFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: db7492476bb961fbaadaf9f80a1fc47e768d101bffc44bc77eaa381e660201f5
                        • Instruction ID: 316b9bc6ecc6c9379777e2bb9e4778dbba6f5fa5993ac2ffb65b205d9366f85d
                        • Opcode Fuzzy Hash: db7492476bb961fbaadaf9f80a1fc47e768d101bffc44bc77eaa381e660201f5
                        • Instruction Fuzzy Hash: 84212672A1020AAFDB04DFA8DD45EEA7BB9FB08314F01462DFD55E3250E635E8619B60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 00AC6C11
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00AC6C20
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: 5481392884dfd69e698cfddd4b1b1aaf241a8be31fad0c1dc038968cb38b1018
                        • Instruction ID: 2b4d0eafae8405e3fe20a2fb63f6a7eeb83bd5a8550f08740725b15f18a479b3
                        • Opcode Fuzzy Hash: 5481392884dfd69e698cfddd4b1b1aaf241a8be31fad0c1dc038968cb38b1018
                        • Instruction Fuzzy Hash: A3116671544208AFEB108F649C81FEB3BAAEB14378F224728F965D71E0C775DC91AB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00AA2F11
                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00AA2F30
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: InfoItemMenu_memset
                        • String ID: 0
                        • API String ID: 2223754486-4108050209
                        • Opcode ID: 09976e020036c48ee8808b12f9a613f3ff11551264ea13db10cc490f7bf99434
                        • Instruction ID: 9d1c231e84fa25a7fa475dcd130a66dfce50f4d010724eac841cf4fdd0cdc6b8
                        • Opcode Fuzzy Hash: 09976e020036c48ee8808b12f9a613f3ff11551264ea13db10cc490f7bf99434
                        • Instruction Fuzzy Hash: 0F11B236901214AFDB21EB5CDC44B9D77B9EB16310F1980A5E854A72E0DBB0AD34C791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00AB2520
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00AB2549
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: c826ae19fa38e1941f70480b88b50260fa43c72c6d99f8658216c98a3a642f3b
                        • Instruction ID: 0d8a0c2298fc5dd70df3c6cb7d362d8be8d424ceb8e4d1309fc88cd9a1ec0863
                        • Opcode Fuzzy Hash: c826ae19fa38e1941f70480b88b50260fa43c72c6d99f8658216c98a3a642f3b
                        • Instruction Fuzzy Hash: 1011CEB0100225BADB348F518C98FFBFFACFB06351F10822BF90552041D2746941DBE0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00AB830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00AB80C8,?,00000000,?,?), ref: 00AB8322
                        • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00AB80CB
                        • htons.WSOCK32(00000000,?,00000000), ref: 00AB8108
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ByteCharMultiWidehtonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 2496851823-2422070025
                        • Opcode ID: 6b294314cb7e82e062a6a0cbf65f5ae32d7ed49b8aa01263cd64377c42c627c7
                        • Instruction ID: 76fb0d1d17786a5d476f7bd52c437ce1b9750707915ae929df12c18398cb130e
                        • Opcode Fuzzy Hash: 6b294314cb7e82e062a6a0cbf65f5ae32d7ed49b8aa01263cd64377c42c627c7
                        • Instruction Fuzzy Hash: 6311E534600205ABCB10EFA8DC86FFDB379FF04350F108526F91197292DB71A811C691
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00A9B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A9B0E7
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A99355
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: 7f6a3f14d126593b7d499bb4a5ae352f0290f4861e3313be28f2f6ab6caf5fbc
                        • Instruction ID: 86f9e0aef23905cbd6c8dcaefd558b649ff2cb1b1efa6452fe83c737386da681
                        • Opcode Fuzzy Hash: 7f6a3f14d126593b7d499bb4a5ae352f0290f4861e3313be28f2f6ab6caf5fbc
                        • Instruction Fuzzy Hash: EB019275A05228BB8F04EFA4CD928FF77A9BF46360B14061DB9725B2D2DB31590C8660
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00A9B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A9B0E7
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A9924D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: 12fb64b32b773de4cfb7f55c2ca9bebaf15c68de091c3b41d720b771a3d9d783
                        • Instruction ID: c25284ad610c536e49255eab5a1db5d168aae13c98d1018c981eba9edc751464
                        • Opcode Fuzzy Hash: 12fb64b32b773de4cfb7f55c2ca9bebaf15c68de091c3b41d720b771a3d9d783
                        • Instruction Fuzzy Hash: 25018475B411187BCF14EBA4CA96EFF77EC9F55340F240029B91267282EB115E0C9672
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A47F41: _memmove.LIBCMT ref: 00A47F82
                          • Part of subcall function 00A9B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A9B0E7
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A992D0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: 06444cba6ed46d2262c9b5cdb8c5811af5a8c99322dc5f586b928c5ab14f498d
                        • Instruction ID: c6c2829c3696f80292bcd3bab99f70a69545e1790f988d97c1b6d9ee75289ec0
                        • Opcode Fuzzy Hash: 06444cba6ed46d2262c9b5cdb8c5811af5a8c99322dc5f586b928c5ab14f498d
                        • Instruction Fuzzy Hash: 9E016D75B412187BDF04EBA4CA86EFF77ECAF15340F240129B95667282DB215E0C9672
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: ClassName_wcscmp
                        • String ID: #32770
                        • API String ID: 2292705959-463685578
                        • Opcode ID: 8e40ad1e9da3bc9b23ac0a3311dfd0861b87c58a9f6dcb515d4cdcba61a1ad91
                        • Instruction ID: ea35db4248b802401763cd1565021c7bc062402734c1ead0346f6f9732971d01
                        • Opcode Fuzzy Hash: 8e40ad1e9da3bc9b23ac0a3311dfd0861b87c58a9f6dcb515d4cdcba61a1ad91
                        • Instruction Fuzzy Hash: FFE09B72A0422D2AD710D7959C45FE7F7ACEB55761F000166F914D3050E96099458BD1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A981CA
                          • Part of subcall function 00A63598: _doexit.LIBCMT ref: 00A635A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: Message_doexit
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 1993061046-4017498283
                        • Opcode ID: 947fdb9f8a148f341203dfce357fc5a3c8e183c864500083454c9688e65244b5
                        • Instruction ID: d47b1acb2acb63935c2923e44956d5eac41495ede5a6ddfda751032f723b9bd6
                        • Opcode Fuzzy Hash: 947fdb9f8a148f341203dfce357fc5a3c8e183c864500083454c9688e65244b5
                        • Instruction Fuzzy Hash: 35D02B323C035836D61033E42D07FC639884B05F12F000422BB09951D38DD5489242D9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00A7B564: _memset.LIBCMT ref: 00A7B571
                          • Part of subcall function 00A60B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A7B540,?,?,?,00A4100A), ref: 00A60B89
                        • IsDebuggerPresent.KERNEL32(?,?,?,00A4100A), ref: 00A7B544
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00A4100A), ref: 00A7B553
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A7B54E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 3158253471-631824599
                        • Opcode ID: a55a871ce3155a2d7ed999caba909231825499acdec92d3cecf8c352b99968e3
                        • Instruction ID: 1748b477f0bceb8095d217d4f5e612ca2e721d70839212e3f6267cb5f6d7b85d
                        • Opcode Fuzzy Hash: a55a871ce3155a2d7ed999caba909231825499acdec92d3cecf8c352b99968e3
                        • Instruction Fuzzy Hash: BEE06DB02107508FD320DF69E904B427BE4AF00708F00C92CE44AC7250DBB8D445CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00AC5BF5
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00AC5C08
                          • Part of subcall function 00AA54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AA555E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1284872708.0000000000A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A40000, based on PE: true
                        • Associated: 00000000.00000002.1284532617.0000000000A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000ACF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285016062.0000000000AF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285078926.0000000000AFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B08000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B0A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1285099614.0000000000B18000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_a40000_Purchase Confirmation 003-23 170204.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 3195e327320041cf8ff624912a7e9662381d359ba212e70f45cd3a3835f8f07a
                        • Instruction ID: ce536006f1d5268d8971375374d55c619c501b7d7be60d12c2e8e6a26050fafa
                        • Opcode Fuzzy Hash: 3195e327320041cf8ff624912a7e9662381d359ba212e70f45cd3a3835f8f07a
                        • Instruction Fuzzy Hash: B1D01231788315BBE774FBB0AC0FFE76A15BB15B51F020C35B759AA1D0DAE85801C658
                        Uniqueness

                        Uniqueness Score: -1.00%